FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY FILE:C:\WP51\72-1\MACLIN C:\ 51 Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY: VIRTUAL FOURTH AMENDMENT PROTECTION IN THE TWENTY-FIRST CENTURY Tracey Maclin * INTRODUCTION The freedoms established in the Bill of Rights—including the Fourth Amendment right to be free from unreasonable governmental searches and seizures—were meant to endure. Advances in science and technology recurrently exert pressure on the scope and meaning of the Fourth Amendment, 1 but the privacy and security protected by the Fourth Amendment should not depend on innovations in technology. “When the American Republic was founded, the framers established a libertarian equilibrium among the competing values of privacy, disclosure, and surveillance. This balance was based on the technological realities of eighteenth-century life.”2 During * Professor of Law, Boston University School of Law. I want to thank Tom Clancy for inviting me to speak at the University of Mississippi School of Law and to attend a symposium entitled, The Effect of Technology on Fourth Amendment Analysis and Individual Rights. I also want to thank the National Center for Justice and the Rule of Law at the University of Mississippi School of Law that is supported by a grant from the Bureau of Justice Assistance, Office of Justice Programs, of the U.S. Department of Justice, for its generous support of this article. Finally, I thank Jill Marr for her research assistance. 1 As Justice Scalia notes: “It would be foolish to contend that the degree of privacy secured to citizens by the Fourth Amendment has been entirely unaffected by the advance of technology.” Kyllo v. United States, 533 U.S. 27, 33-34 (2001); see also Raymond Shin Ray Ku, The Founders' Privacy: The Fourth Amendment and the Power of Technological Surveillance, 86 MINN. L. REV. 1325, 1344 (2002) (arguing that “[f]rom the beginning, the Supreme Court has taken a narrow view of the Fourth Amendment's role in limiting government discretion to employ novel technologies”); Thomas K. Clancy, What Does The Fourth Amendment Protect: Property, Privacy, or Security, 33 WAKE F OREST L. REV. 307, 335 (1998) (noting that the “overall tendency of the Court has been to contract the protected individual interest as a consequence of modern technological advances and their utilization by the government”). 2 ALAN F. WESTIN , P RIVACY AND F REEDOM 67 (1967). 51 FILE:C:\WP51\72-1\MACLIN.DTP 52 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 the Framers' era, the home was the focal point of privacy and personal security. 3 The Fourth Amendment proscribed intrusions into a home unless a government official obtained a judicial warrant supported by specific procedural safeguards. 4 With the increased use of technology in the twentieth century, the Supreme Court confronted search and seizure questions never imagined by the Framers. During the firsthalf of the twentieth century, Fourth Amendment liberties typically fared poorly under the pressure of a technologically advancing society. For example, police investigative methods adapted to deal with the mobility of cars when automobile travel became accessible to many people. In 1925, the Court ruled a warrantless search of a car and its contents is reasonable, provided there is probable cause to believe that the vehicle contains contraband. 5 Three years later, the Court ruled the Fourth Amendment did not encompass police wiretapping of telephone conversations. The Court explained wiretapping involves neither a search nor seizure within the meaning of the Amendment, 6 and that “one who installs in his house a telephone instrument with connecting wires intends to project his voice to those quite outside, and that the wires beyond his house and messages while passing over them are not within the protection of the [Fourth] Amendment.”7 By the 1950's, pressure mounted, on and off the Court, to reconsider whether the Amendment's protective scope excluded wiretapping. Notwithstanding the criticism of its wiretapping ruling, in 1952 the Court held that use of a “wired spy” to capture the conversations of the defendant and a government informant who surreptitiously recorded them did not trigger Fourth Amendment protection.8 The Court, however, scoffed at the notion that police use of a wired informant is akin to police 3 (1967). See, e.g., DAVID H. F LAHERTY , P RIVACY IN COLONIAL NEW ENGLAND 45 See Thomas Y. Davies, Recovering the Original Fourth Amendment, 98 MICH. L. REV. 547, 551 (1999) (“The historical statements about search and seizure focused on condemning general warrants. In fact, the historical concerns were almost exclusively about the need to ban house searches under general warrants.”). 5 Carroll v. United States, 267 U.S. 132, 149 (1925). 6 Olmstead v. United States, 277 U.S. 438, 464 (1928). Olmstead explained that the Fourth Amendment does not forbid wiretapping. “There was no searching. There was no seizure. The evidence was secured by the use of the sense of hearing and that only. There was no entry of the houses or offices of the defendants.” Olmstead, 277 U.S. at 464. 7 Id. at 466. 8 On Lee v. United States, 343 U.S. 747, 751 (1952). 4 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 53 wiretapping.9 Although the Court gave the police wide discretion to u tilize technology to investigate individuals during the first half of the twentieth century,10 the Court transformed its analytical approach toward electronic surveillance in the mid-1960's. First, the Court rejected its earlier conclusion that oral communications were not covered by the Fourth Amendment. 11 The Court then decided three cases which demonstrated a dramatic shift in the Justices' thoughts about electronic surveillance methods. Having previously determined that law enforcement officials could freely use wiretapping and wired informants without constitutional restraint, by 1967 the Court reversed course and ruled that judicial approval was a pre-condition to validate electronic surveillance. In the first case, Osborn v. United States,12 the Court approved a judicial order authorizing a tape recording of an attorney's conversation with a government informant. A detailed affidavit alleged that the attorney attempted to bribe a juror.13 The Osborn Court specifically noted that the challenged electronic surveillance involved police 9 On Lee, 343 U.S. at 754. The On Lee Court asserted: “It would be a dubious service to the genuine liberties protected by the Fourth Amendment to make them bedfellows with spurious liberties improvised by farfetched analogies which would liken eavesdropping on a conversation, with the connivance of one of the parties, to an unreasonable search or seizure.” Id. 10 In cases where electronic surveillance constituted a physical trespass or entry into a constitutionally protected area, Fourth Amendment safeguards were imposed. Compare Silverman v. United States, 365 U.S. 505, 510-12 (1961) (use of a “spike mike”–which is a device that made contact with a heating duct serving the house occupied by the defendants–was “an unauthorized physical penetration” of the premises, and thus a search under the Fourth Amendment), with Goldman v. United States, 316 U.S. 129, 135 (1942) (use of a detectaphone—which captures sound waves–placed against the wall of an office in order to overhear conversations in an adjoining office was no search because there was no physical trespass of the targeted office). 11 Olmstead concluded that oral communications were not protected by the Fourth Amendment. Olmstead, 277 U.S. at 464. This conclusion was later rejected in Silverman, 365 U.S. at 511 (finding a Fourth Amendment violation because “the officers overheard the petitioners' conversations only by usurping part of the petitioners' house or office” without judicial authorization) and Wong Sun v. United States, 371 U.S. 471, 485 (1963) (explaining that Silverman recognizes that “the Fourth Amendment may protect against the overhearing of verbal statements as well as against the more traditional seizure of `papers and effects.'”). Cf. United States v. White, 401 U.S. 745, 775 (1971) (Harlan, J., dissenting) (noting that Wong Sun “expressly brought verbal communications within the sweep of the Fourth Amendment”). 12 385 U.S. 323 (1966). 13 Osborn, 385 U.S. at 328. 53 FILE:C:\WP51\72-1\MACLIN.DTP 54 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 monitoring “under the most precise and discriminate circumstances.”14 Osborn was an unusual case because government agents had sought judicial approval before undertaking electronic monitoring. Thus, Osborn was an unlikely precedent to affect major change in the way law enforcement officials conducted electronic surveillance. The discerning reader, however, would recognize that Osborn signaled the Justices' discomfort with previous rulings upholding electronic surveillance.15 While Osborn may not have caught the attention of law enforcement officials, a second case, Berger v. New York,16 was a bombshell for the police. Berger invalidated New York's electronic surveillance statute. The Court found that the electronic surveillance that the statute authorized contained numerous constitutional flaws. 17 Beyond the specific constitutional objections that the majority listed, some of the Berger Court's harsh language condemning the New York statute “left the dissenting Justices (and many others) wondering whether any wiretapping or electronic Id. at 329. Prior to Osborn, in Lopez v. United States, 373 U.S. 427 (1963), the Court upheld the admission of testimony of an Internal Revenue agent's conversation with a defendant who had tried to bribe the agent and a tape recording of that conversation that was captured by a pocket recorder worn by the agent. Lopez, 373 U.S. at 440. The Lopez Court ruled that no unconstitutional invasion of Lopez's office occurred because the agent had the defendant's “consent, and while there [the agent] did not violate the privacy of the office by seizing something surreptitiously without petitioner's knowledge.” Id. at 438. Four members of the Lopez Court wanted to overrule On Lee. See id. at 441-43 (Warren, C.J., concurring) (arguing that On Lee should be overruled, but distinguishing facts in Lopez from On Lee because the use and purpose of the electronic recording equipment in On Lee “was not to corroborate the testimony of the [government informant], but rather, to obviate the need to put him on the stand”); see id. at 446-53 (Brennan, J., dissenting) (arguing that On Lee and Lopez are indistinguishable). The Osborn majority avoided the debate that was left unsettled in Lopez “because it is evident that the circumstances under which the tape recording was obtained in this case fall within the narrower compass of the Lopez concurring and dissenting opinions.” Osborn, 385 U.S. at 327. 16 388 U.S. 41 (1967). 17 Berger, 388 U.S. at 56, 58-59. Berger explained that the statute was unconstitutional because first, “[i]t lays down no requirement for particularity in the warrant as to what specific crime has been or is being committed, nor `the place to be searched,' or `the persons or things to be seized' as specifically required by the Fourth Amendment.” Id. at 56; see also id. at 58-59. Second, the statute authorized surveillance “for a two-month period [which] is the equivalent of a series of intrusions, searches and seizures pursuant to a single showing of probable cause” and permitted extensions of surveillance on “a mere showing that such extension is `in the public interest.'” Id. at 59. Third, the statute “places no termination date on the eavesdrop once the conversation sought is seized. This is left entirely in the discretion of the officer.” Id. at 59-60. Finally, the statute did not require prompt return on the warrant “thereby leaving full discretion in the officer as to the use of seized conversations of innocent as well as guilty parties.” Id. at 60. 14 15 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 55 eavesdropping statute could pass constitutional muster.”18 Finally, Katz v. United States,19 decided a year after Osborn , eliminated any lingering uncertainty about the constitutional validity of unchecked police wiretapping. Katz held that FBI agents violated the Fourth Amendment when, without judicial authorization, they attached an electronic listening and recording device to the outside of a public telephone booth that the defendant used. 20 Katz was a landmark case.21 The ruling not only solidified the Court's view that the Constitution required judicial supervision of electronic surveillance, it also “purported to clean house on outmoded [F]ourth [A]mendment principles.”22 Moreover, in the view of many, the impact of Katz was “to expand rather than generally to reconstruct the boundaries of [F]ourth [A]mendment protection.”23 Put simply, the holding and logic of Katz was revolutionary. Katz moved the Court “toward a redefinition of the scope of the [F]ourth [A]mendment.”24 The passage of time, however, would show that Katz would do little to protect Fourth Amendment liberties. The technological advances of the twenty-first century will present new, and sometimes more challenging, issues as judges grapple with the question of how much privacy and security the Fourth Amendment provides. 25 At the start of 18 YALE K AMISAR ET AL., BASIC CRIMINAL P ROCEDURE: CASES, COMMENTS AND QUESTIONS 352-53 (10th ed. 2002). 19 389 U.S. 347 (1967). 20 Katz, 389 U.S. at 359. 21 See 1 W AYNE R. L A F AVE , SEARCH AND SEIZURE § 2.1(b), at 385 (3d ed. 1996). 22 Note, From Private Places to Personal Privacy: A Post-Katz Study of Fourth Amendment Protection, 43 N.Y.U. L. REV. 968, 975 (1968). 23 Anthony Amsterdam, Perspectives on the Fourth Amendment, 58 MINN. L. REV. 349, 385 (1974). 24 Edmund W. Kitch, Katz v. United States: The Limits of the Fourth Amendment, 1968 SUP. CT. REV. 133, 133; see also Stephen A. Saltzburg, Another Victim of Illegal Narcotics: The Fourth Amendment (As Illustrated by the Open Fields Doctrine) 48 P ITT. L. REV. 1, 11-12 (1986) (explaining how Katz tends to redefine the scope of the Fourth Amendment); Albert W. Alschuler, Interpersonal Privacy and the Fourth Amendment, 4 N. ILL. U. L. REV. 1, 6 n.12 (1983) (explaining how Katz ties the right to privacy to “changing cultural expectations” of privacy). Cf. David A. Sklansky, Back To The Future: Kyllo, Katz, and Common Law, 72 MISS. L.J. 143, 145 (2002) (describing Katz as “perhaps the most influential search-and-seizure decision of the past halfcentury”). 25 Cf. Susan Bandes, Power, Privacy and Thermal Imaging, 86 MINN. L. REV. 1379, 1383 (2002) (“On a more basic level, technology advances pose the challenges that always beset the constitutional enterprise–those involved with trying to create fixed rules, or at least a workable rule of law, for a changing world. In this regard, technology illustrates the problem with trying to rely on 55 FILE:C:\WP51\72-1\MACLIN.DTP 56 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 this new century, the Court decided Kyllo v. United States,26 which in tone and substance resembles Katz. Kyllo ruled that a thermal imaging device directed at a home constituted a search within the meaning of the Fourth Amendment. 27 The Court explained that a search occurs when government agents use sense-enhancing technology to collect any information regarding the interior of a home that could not otherwise be obtained without a physical invasion, “at least where (as here) the technology in question is not in general public use.”28 Like Katz, Kyllo is an important case for assessing the Court's current thinking on the interplay of technology and the Fourth Amendment. Kyllo's long-term fixed understandings of how the world works.”); Gavin Skok, Establishing a Legitimate Expectation of Privacy in Clickstream Data, 6 MICH. T ELECOMM. & T ECH. L. REV. 61, 70 (2000) (noting the danger “that courts will rigidly adhere to outdated Fourth Amendment concepts which are ill-suited to cyberspace, leading to the conclusion that Web users lack legitimate expectations of privacy in clickstream data”). Occasionally, the key to resolving an emerging issue of the twenty-first century requires application of traditional constitutional doctrine. For example, Professor Orin Kerr has noted that “[a]lthough the Internet is a recent development with great promise for revolutionary change, the Fourth Amendment questions raised by encrypting Internet communications are decades (if not centuries) old.” Orin S. Kerr, The Fourth Amendment in Cyberspace: Can Encryption Create a “Reasonable Expectation of Privacy?” 33 CONN. L. REV. 503, 532 (2001). In an insightful article, Professor Kerr contends that encryption cannot create a constitutionally protected privacy interest, and government efforts to unscramble an encrypted communication do not constitute searches under the Fourth Amendment. Id. at 517-24. Professor Kerr predicts that in resolving this issue, judges will ultimately discover that the Fourth Amendment issue raised by encryption “involve[s] old wine in new bottles.” Id. at 532. 26 533 U.S. 27 (2001). 27 Kyllo, 533 U.S. at 40. 28 Id. at 34. Kyllo's holding is announced in two different places in Justice Scalia's opinion. See id. (“We think that obtaining by sense-enhancing technology any information regarding the interior of the home that could not otherwise have been obtained without physical `intrusion into a constitutionally protected area' constitutes a search–at least where (as here) the technology in question is not in general public use.”) (citation omitted); id. at 40 (“Where, as here, the Government uses a device that is not in general public use, to explore details of the home that would previously have been unknowable without physical intrusion, the surveillance is a `search.'”). As Professor Christopher Slobogin perceptively explains, although Kyllo's holding expands Fourth Amendment protection to include thermal imaging, it also shrinks the constitutional protection afforded private homes by codifying a “naked eye” exception to the warrant requirement. See Christopher Slobogin, Peeping Techno-Toms and the Fourth Amendment: Seeing Through Kyllo's Rules Governing Technological Surveillance, 86 MINN. L. REV. 1393, 1410 (2002) (explaining that, taken together, Kyllo's holdings “announce that if the activity observed could be seen with the naked eye without physical intrusion into the constitutionally protected areas of home or curtilage, then police may exploit any technology–generally used or not–without implicating the Fourth Amendment.”); id. at 1414 (noting that Kyllo “holds that enhanced searches of the home are permissible if they merely duplicate naked eye searches from vantage points that are not constitutionally protected”). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 57 impact on search and seizure doctrine, however, remains uncertain. In a thoughtful and well-reasoned article, Professor David Sklansky states that Kyllo is likely to be one of the “touchstones” for the Court when it decides future cases involving the government's ability to use technology to gather information and fight terrorism. 29 According to Professor Sklansky, “[e]ven before [the] September 11 [terrorist attacks] . . . , it was apparent that Kyllo had significance beyond its narrow holding and beyond its value as a curiosity.”30 While I agree with much of Professor Sklansky's analysis of Kyllo, I do not share his view that Kyllo's analytical framework will be a “touchstone[]” for future disputes involving technology and the Fourth Amendment. I predict that Kyllo's impact on protecting Fourth Amendment liberties, like Katz, will be slight. Just as the Court later confined the “right” established in Katz to a privilege against clandestine wiretapping and electronic bugging without judicial supervision,31 the Court is likely to construe the “right” announced in Kyllo narrowly. In other words, Kyllo, like Katz, will not prevent police officials from using other types of technology to monitor and discover information helpful to law enforcement interests. Part I of this article briefly discusses the similarities between Katz and Kyllo. This section describes the common traits shared by Katz and Kyllo: both cases were immediately recognized as important rulings, both cases signaled a shift or readjustment of Fourth Amendment law, and both cases rest on a simple, but persuasive logic about the scope of protection provided by the Fourth Amendment. Part II analyzes the substance of the Katz ruling and considers the long-term impact of Katz for protecting Fourth Amendment rights against technological innovations. This section contends that Katz has failed to protect Fourth Amendment rights for two reasons. First, Katz was a ruling without substance. Second, the Justices who decided Katz were unable to agree on the meaning of their ruling, which made it easier for future Justices to ignore the relevance of Katz in subsequent cases concerning the reach of the Fourth 29 30 31 Sklansky, supra note 24, at 144. Sklansky, supra note 24, at 145. See, e.g., United States v. United States Dist. Ct., 407 U.S. 297, 308 (1972). 57 FILE:C:\WP51\72-1\MACLIN.DTP 58 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 Amendment. Part III considers what impact Kyllo may have on future cases involving technology and the Fourth Amendment. Although Kyllo's impact on Fourth Amendment liberties is uncertain at this point, this section argues that Kyllo is unlikely to prevent government officers from using technology to monitor and reveal information. The final section of the article, Part IV, examines how the Court might address the constitutional status of e-mail addressing information and whether Carnivore's pen mode intercept constitutes a search un der the Fourth Amendment in a postKyllo world. Part IV contends that if Carnivore's pen mode intercept is judged by the rule announced in Kyllo, then the Court should find that this intrusion is a search. Nevertheless, Part IV concludes with the prediction that the Court will find that Carnivore's pen mode intercept does not violate the Fourth Amendment. I. THE SIMILARITIES BETWEEN KATZ AND KYLLO A. Both cases were immediately recognized as significant rulings Katz and Kyllo share three prominent characteristics. First, the public and legal profession recognized both cases as significant rulings that would impact Fourth Amendment doctrine. Legal commentators and the press immediately recognized Katz as an important case. The press commented on the break from the trespass rule32 and expressed surprise that the Court was willing to uphold any electronic surveillance,33 while legal commentators commented on the Court's new methodology for determining when a search occurs. 34 Likewise, while Kyllo involved rather narrow facts, 32 Fred P. Graham, A Plug in the `Big Ear,' N.Y. T IMES, Dec. 24, 1967, § 4, at 10 (“Last week the Supreme Court faced up to the scientific facts of life and held that the Fourth Amendment covers all police eavesdropping, whether accomplished by means of a trespass into private premises or not.”). 33 See id. (“[That the Court added that the bugging in Katz would have been constitutional had a search warrant been procured] caught many lawyers by surprise, because the tone of the Supreme Court's recent eavesdrop decisions has been so hostile that people assumed the Justices would hedge police-bugging in with so many legal technicalities that almost any useful eavesdropping would be deemed unconstitutional.”); Fred P. Graham, N.Y. T IMES, Dec. 19, 1967, at A1 (“[T]he wording of the [Katz] decision erased an impression that had been created in a decision of the Court last June that the Supreme Court would insist on such elaborate procedures in connection with these warrants that bugging would become virtually useless as a police tool.”). 34 See, e.g., Note, From Private Places to Personal Privacy: A Post-Katz Study of Fourth Amendment Protection, 43 N.Y.U. L. REV. 968 (1968) FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 59 the press and legal academics quickly noted the significance of the ruling and the possible effect the ruling could have on the government's use of technology.35 B. Both cases readjusted Fourth Amendment law Both Katz and Kyllo also signaled a shift, or readjustment, in Fourth Amendment law. Katz, authored by Justice Stewart, explicitly rejected two concepts that previously influenced the shape of search and seizure (describing Katz as a “landmark” case); id. at 981 (“[T]he Katz decision has pointed the way towards a complete re-orientation in the analysis of problems relating to governmental intrusion into individuals' private affairs.”); id. (“Rather than relying on an interpretation of the nature and legitimacy of the Government's searching activity, the Court's holding was based solely on the validity of the individual's expectation of privacy. . .”); Kitch, supra note 22, at 133 (“The Supreme Court is moving toward a redefinition of the scope of the Fourth Amendment. Katz v. United States, . . . indicates that the Court is now prepared to release the Fourth Amendment, . . . from the moorings of precedent and determine its scope by the logic of its central concepts.”) (footnotes omitted). 35 See, e.g., Linda Greenhouse, The Supreme Court: Ruling on Surveillance Procedures; Justices Say Warrant Is Required in High-Tech Searches of Homes, N.Y. T IMES, June 12, 2001, at A1 (describing Kyllo as an “important declaration of the constitutional limits on new privacy-threatening technology”); Linda Greenhouse, As Crime Ebbs, Top Court's Privacy Rulings Flow, N.Y. T IMES, June 17, 2001, § 4, at 16 (noting: “It is almost as if the public, liberated from the burdensome presence of crime, is free to express doubts about the civic costs of a whole range of crime-fighting strategies, from racial profiling to high-tech eavesdropping to low-tech drug-sniffing dogs.”); David G. Savage, Court Says No to Home Snooping Law: U.S. Justices Restrict the Use of Heat Sensors and Other High-Tech Spy Devices by Police, L.A. T IMES, June 12, 2001, at A1 (“The ruling appears to put a significant limit on the government's use of new technologies that can pick up sounds or images inside a home . . . . The decision itself marked the third major ruling this year in which the justices have rejected drug searches and put new limits on the war on drugs.”); Edward Walsh, HighTech Devices Require a Warrant; Court: Search Violates Privacy Right, WASH. P OST, June 12, 2001, at A1 (“`It means that the Fourth Amendment is going to apply to all the high-tech technology that is rapidly being developed. Big Brother must now pay attention to constitutional principles.'”) (quoting Steven R. Shapiro, national legal director of the American Civil Liberties Union); cf. id. (“`It is an additional step they have to go through. The Fourth Amendment is important, privacy is important, but this is not a blockbuster case.'”) (quoting Kent Scheidegger, legal director of Criminal Justice Legal Foundation); Michelle M. Jochner, Privacy Versus Cyber-Age Police Investigation: The Fourth Amendment in Flux, 90 ILL. BAR J. 70 (describing Kyllo as a “landmark decision”); id. (“The Court's decision in Kyllo makes it clear that although technology have evolved, the intent underpinning the Fourth Amendment remains constant.”). Two other commentaries have discussed Kyllo. See Sean D. Thueson, Fuzzy Shades of Gray: The New “Bright-Line” Rule in Determining When the Use of Technology Constitutes a Search, 2 WYO. L. REV. 169 (2002); Sarilyn E. Hardee, Why the United States Supreme Court's Ruling in Kyllo v. United States Is Not the Final Word on the Constitutionality of Thermal Imaging, 24 CAMPBELL L. REV. 53 (2001). 59 FILE:C:\WP51\72-1\MACLIN.DTP 60 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 doctrine. Prior to Katz, a judicial finding that the challenged police action invaded a “constitutionally protected area” was necessary to trigger the Amendment's safeguards. 36 In their briefs to the Court, the litigants contested whether a public telephone booth was a constitutionally protected area. Justice Stewart, however, found the debate unhelpful. “[T]his effort to decide whether or not a given `area,' viewed in the abstract, is `constitutionally protected' deflects attention from the problem presented by this case.”37 At this point, Justice Stewart wrote the lines that would symbolize the meaning and spirit of Katz: For the Fourth Amendment protects people, not places. What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection. But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected.38 In addition to dismissing the importance of whether the intrusion compromised a constitutionally protected area, Katz also rejected the rule that invocation of Fourth Amendment protection required a physical intrusion or “trespass” by government officials. 39 Justice Stewart acknowledged that the Court's previous rulings barred constitutional scrutiny of police intrusions in the absence of a physical penetration because the Amendment “was thought to limit only searches and seizures of tangible property.”40 Justice Stewart, however, explained that the “trespass” rule was no longer viable in light of the Court's more recent rulings that the Amendment covers the seizure of oral statements, even when a police intrusion was not a trespass under local property law. “Once this much is acknowledged, and once it is recognized that the Fourth Amendment protects people—and not simply `areas'—against unreasonable searches and seizures, it becomes clear that the reach of that Amendment cannot turn upon the presence or absence of a physical intrusion into any 36 See 1 L A F AVE , supra note 21, § 2.1(a) at 380 (explaining that what the preKatz cases “added up to, as the Supreme Court was later to put it, was that for there to be a Fourth Amendment search the police must have physically intruded into `a constitutionally protected area'”) (citations and footnote omitted). In Katz, Justice Stewart acknowledged this point, although he sought to downplay the determinative weight given in prior cases to the concept of a “constitutionally protected area.” See Katz v. United States, 389 U.S. 347, 351, n.9 (1967) (explaining that the Court has “never suggested that this concept can serve as a talismanic solution to every Fourth Amendment problem.”). 37 Katz, 389 U.S. at 351 (footnote omitted). 38 Id at 351-52 (citations omitted). 39 Id. 40 Id. at 352-53 (footnote omitted). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 61 given enclosure.”41 Thus, with bold strokes, Katz rejected previous understandings that had dictated the reach and meaning of the Fourth Amendment. After Katz, the scope of the Amendment would not only be loosened from the ancient niceties of common-law property rules, but the substantive content of the Amendment would derive from thoroughly modern and realistic understandings of the privilege against unreasonable searches and seizures. 42 Like Katz, Kyllo also represents a shift, albeit subtle, in the Court's approach to defining what is a “search” under the Amendment. The government contended that the thermal imaging directed at Kyllo's home was not a search because it did not reveal any intimate details of his home.43 The Court's “threshold” cases seemed to support the Government's position. Indeed, since at least 1984, the Court had strongly intimated that police in trusions directed at homes might not trigger constitutional inquiry unless those intrusions interfered with or revealed intimate activities associated with the home. For example, in Oliver v. United States, 44 the Court explained that the Amendment's protection of “houses” went beyond merely protecting the physical interior of a home; it also protected the curtilage of the home.45 Citing the common law, Oliver opined that the curtilage “is the area to which extends the intimate activity associated with the `sanctity of a man's home and the privacies of life,' and therefore has been Id. at 353. See id. at 352 (“No less than an individual in a business office, in a friend's apartment, or in a taxicab, a person in a telephone booth may rely upon the protection of the Fourth Amendment. One who occupies it, shuts the door behind him, and pays the toll that permits him to place a call is surely entitled to assume that the words he utters into the mouthpiece will not be broadcast to the world. To read the Constitution more narrowly is to ignore the vital role that the public telephone has come to play in private communications.”). Professor Amsterdam cogently recognized that the crucial question at stake in a case like Katz is “a value judgement.” Amsterdam, supra note 23 at 403 (“The ultimate question, plainly, is a value judgment. It is whether, if the particular form of surveillance practiced by the police is permitted to go unregulated by constitutional restraints, the amount of privacy and freedom remaining to citizens would be diminished to a compass inconsistent with aims of a free and open society.”). 43 See Brief for the United States at 22, Kyllo (99-8508) (“This Court's decisions establish . . . that the Fourth Amendment does not preclude the government from obtaining the assistance of technology to observe an area that is exposed to the public, provided that the technology does not permit the government to detect private activities occurring in the private areas.”) (emphasis added). 44 466 U.S. 170 (1984). 45 Oliver, 466 U.S. at 181 n.12. 41 42 61 FILE:C:\WP51\72-1\MACLIN.DTP 62 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 considered part of the home itself for Fourth Amendment purposes.”46 United States v. Dunn47 elevated Oliver's dicta on the meaning of curtilage to law. In Dunn, the Court adopted Oliver's definition of curtilage and noted that a “central component of th[e] inquiry [regarding the extent of a home's curtilage is] whether the area harbors the intimate activity associated with the `sanctity of a man's home and the privacies of life.'”48 Dunn then identified several factors for determining whether a particular area fell within the curtilage of a home.49 One factor considered “the nature of the u ses to which the area is put.”50 When applying this criterion to the facts in Dunn, the Court explained that it was “especially significant that the law enforcement officials possessed objective data indicating that the [area] was not being used for intimate activities of the home.”51 Oliver and Dunn were not the only cases lending support to the government's claim in Kyllo that police conduct directed at a home did not trigger constitutional scrutiny unless it revealed intimate details of the home. The Court held in California v. Ciraolo52 that no search occurred when police officers, flying in navigable airspace, observed marijuana growing in a fenced-in backyard.53 The fact that the activities that the police observed lay within the curtilage did not help Ciraolo. 54 The Court ruled that the flyover was not a search because the surveillance occurred in “a physically nonintrusive manner” and within “public navigable airspace.”55 Although Ciraolo ruled that police flyovers do not trigger Fourth Amendment rev iew, the Court left open the possibility that other types of aerial observations might produce a different result. 56 In particular, the Court highlighted the State's concession that “`[a]erial observation of curtilage may become invasive, either due to physical Id. at 180 (quoting Boyd v. United States, 116 U.S. 616, 630 (1886)). 480 U.S. 294 (1987). Dunn, 480 U.S. at 300 (quoting Oliver, 466 U.S. at 180) (internal quotation marks omitted). 49 Id. at 301. 50 Id. The Court also looked to “the proximity of the area claimed to be curtilage to the home, whether the area is included within an inclosure surrounding the home . . . and the steps taken by the resident to protect the area from observation by people passing by.” Id. 51 Id. at 302. 52 476 U.S. 207 (1986). 53 Ciraolo, 476 U.S. at 215. 54 In Oliver and Dunn, the police intrusions did not breach the curtilage. 55 Ciraolo, 476 U.S. at 213. 56 Id. at 215. 46 47 48 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 63 intrusiveness or through modern technology which discloses to the senses those intimate associations, objects or activities otherwise imperceptible to police or fellow citizens.'”57 Three years after deciding Ciraolo, in Florid a v. Riley58 the Court ruled that helicopter surveillance of a greenhouse adjacent to a home was not a search.59 Noting that Ciraolo controlled this case, Justice White's plurality opinion explained that “because the sides and roof of his greenhouse were left partially open” and because the observation occurred while the helicopter was in navigable airspace, Riley could not reasonably have expected that the interior of the greenhouse would remain free from police inspection.60 At the end of his opinion, however, Justice White acknowledged that the helicopter observation did not interfere with the normal use of the greenhouse or other parts of the curtilage and, most importantly, “no intimate details connected with the use of the home or curtilage were observed.”61 Relying on these cases and others not involving intrusions of homes, the government argued in Kyllo that thermal imaging was not a search because it did not “`detect private activities occurring in private areas.'”62 This argument, however, did not persuade Justice Scalia. According to Scalia, “[t]he Fourth Amendment's protection of the home has never been tied to measurement of the quality or quantity of information obtained.”63 Justice Scalia then stated: “In the home, our cases show, all details are intimate details, because the entire area is held safe from prying government eyes.”64 57 Id. at 215, n. 3, quoting Brief for Petitioner 14-15 (emphasis added). In Dow Chem. Co. v. United States, 476 U.S. 227 (1986), the Court held that aerial photography of an industrial complex did not constitute a search. Dow Chem. Co., 476 U.S. at 234. While acknowledging that the use of “highly sophisticated surveillance equipment not generally available to the public, such as satellite technology, might be constitutionally proscribed absent a warrant,” the Court stressed that the challenged photos did not reveal “intimate details as to raise constitutional concerns.” Id. at 238 (emphasis added). 58 488 U.S. 445 (1989). 59 Riley, 488 U.S. at 448. 60 Id. at 448-50. 61 Id. at 452. 62 Kyllo v. United States, 533 U.S. 27, 37 (2001) (quoting Brief for United States at 22); see also Andrew Riggs Dunlap, Fixing the Fourth Amendment with Trade Secret Law: A Response to Kyllo v. United States, 90 GEO. L.J. 2175, 2184-85 (2002) (noting cases where the Court suggested that unless government conduct revealed “intimate details” of the home, no search occurred). 63 Kyllo, 533 U.S. at 37. 64 Id. 63 FILE:C:\WP51\72-1\MACLIN.DTP 64 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 Thus, the information that the thermal imaging device revealed, “how warm—or even how relatively warm—Kyllo was heating his residence,” was protected against government snooping.65 Therefore, with little fanfare, Kyllo turned aside a momentum that had been building in the Court's prior cases. 66 Those cases suggested that unless the challenged police conduct compromised intimate activities of the home, Fourth Amendment review was unavailable. 67 Justice Scalia's opinion signals a readjustment in the Court's thinking on this issue.68 Just as Katz discarded a narrow view of the Fourth Amendment's scope,69 Kyllo also rejected the notion that a 65 Id. at 38 (footnote omitted). Justice Scalia dismissed the government's reliance on Ciraolo's dictum cautioning against police use of modern technology that exposes “intimate associations, objects or activities otherwise imperceptible to police or fellow citizens.” Id. at n.5 (quoting Ciraolo, 476 U.S. at 215 n.3). In Justice Scalia's view, Ciraolo's “focus in this second-hand dictum was not upon intimacy but upon otherwise-imperceptibility, which is precisely the principle we vindicate today.” Id. at n. 5. 66 Justice Scalia asserted that “our cases show, all details [of a home] are intimate details, because the entire area is held safe from prying government eyes.” Id. at 37. But United States v. Karo, 468 U.S. 705 (1984) and Arizona v. Hicks, 480 U.S. 321 (1987), which are cited by Justice Scalia to support his statement, are rather thin columns to support the rule that “all details” of a home are constitutionally protected. Karo held that monitoring of a beeper constitutes a search when it reveals information regarding the inside of a home that could not have been obtained through visual surveillance. Karo, 468 U.S. at 715. Although Karo's holding is consistent with Justice Scalia's statement, before Kyllo, the result in Karo had never been understood to stand for the proposition that “all details” of a home are constitutionally protected. Rather, the result in Karo turned on the fact that the beeper device used there helped the government “obtain information that it could not have obtained by observation from outside the curtilage of the house.” Id. at 715. Similarly, Hicks was about limiting the scope of police entries into homes,66 rather than establishing a rule that “all details” of a home are constitutionally protected. Hicks, 480 U.S. at 323. The Hicks majority, in an opinion by Justice Scalia, first rejected the government's claim that an officer's moving of stereo equipment to reveal its serial number did not constitute a new “search” because it produced no additional invasion of privacy separate from the already lawful presence of the officer, which was justified by an emergency call that a shooting had occurred inside the premises. Id. at 325 Justice Scalia explained that “taking action, unrelated to the objectives of the authorized intrusion, which exposed to view concealed portions of the apartment or its contents, did produce a new invasion of respondent's privacy unjustified by the exigent circumstance that validated the entry.” Id. at 325. He then noted: “A search is a search, even if it happens to disclose nothing but the bottom of a turntable.” Id. Interestingly, the holdings in Karo and Hicks did not prevent the Court from finding that the aerial intrusions in Ciraolo and Riley were not searches despite the fact that the challenged photography revealed details of the curtilage of private homes. 67 See supra notes 51-53, 65-66 and accompanying text. 68 See supra note 66 and accompanying text. 69 See Katz v. United States, 389 U.S. 347, 353 (1967) (noting that while Olmstead held that “surveillance without any trespass and without the seizure of any material object fell outside the ambit of the Constitution, we have since departed from the narrow view”). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 65 police intrusion “must be rather substantial and must reveal specifically certain intimate details” to invoke Fourth Amendment scrutiny.70 For this reason, Professor LaFave applauds Justice Scalia's opinion “for foregoing [one of] the various privacy-belittling techniques that have become rather common in efforts to narrow the protections of the Katz doctrine.”71 A second feature of Kyllo's reasoning—the importance of bright-line rules—also indicates a change of direction, albeit a shift that may be temporary, from the Court's most recent case involving the scope of protection afforded private homes. In Kyllo, Justice Scalia stated that restricting “the prohibition of thermal imaging to `intimate details' would not only be wrong in principle; it would be impractical in application, failing to provide `a workable accommodation between the needs of law enforcement and the interests protected by the Fourth Amendment.'”72 He then noted the inability of police officers to predict the amount of detail that a particular thermal imaging device will reveal. 73 Justice Scalia also wondered whether the Court was capable of articulating a Fourth Amendment rule that identifies which activities of the home are “`intimate' and which are not.”74 And even if the Court announced such a rule, “no police officer would be able to know in advance whether his through-the-wall surveillance picks up `intimate' details—and thus would be unable to know in advance whether it is constitutional.”75 Accordingly, Justice Scalia concluded that because the Fourth Amendment “draws `a firm line at the entrance to the house,'”76 police officers are better served if the line is not “only firm but also bright”—which means “clear specification of those methods of surveillance that require a warrant.”77 70 2002). 1 WAYNE R. L AF AVE, SEARCH AND SEIZURE § 2.2, at 77 (3d ed. 1996) (Supp. Id. at 76. Kyllo, 533 U.S. at 38 (quoting Oliver v. United States, 466 U.S. 170, 181 (1984)). 73 See id. at 38 (noting “there is no necessary connection between the sophistication of the surveillance equipment and the `intimacy' of the details that it observes—which means that one cannot say (and the police cannot be assured) that use of the relatively crude equipment at issue here will always be lawful”). 74 Id. at 39. 75 Id. 76 Id. at 40 (quoting Payton v. New York, 445 U.S. 573, 590 (1980)). 77 Kyllo, 533 U.S. at 40. 71 72 65 FILE:C:\WP51\72-1\MACLIN.DTP 66 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 Kyllo's emphasis on the importance of bright-line rules is a notable change of direction from the reasoning of the Court in Minnesota v. Carter.78 In Carter, a police officer, peering through a gap in the closed blinds of an apartment window, observed three individuals bagging cocaine—the female leaseholder of the premises and two men, Carter and Johns. 79 Police eventually arrested the men outside of the apartment and later learned that the men had entered the apartment for the sole purpose of packaging cocaine, had no prior contact with the premises, and that the men were in the apartment for approximately two-and-one-half hours. 80 The issue confronting the Court was whether Carter and Johns had a legitimate expectation of privacy in their host's home.81 Chief Justice Rehnquist's plurality opinion neatly summarized the extant doctrine. “[A]n overnight guest in a home may claim the protection of the Fourth Amendment, but one who is merely present with the consent of the householder may not.”82 The facts in Carter were “obviously somewhere in between” the per se rules that the Court's prior cases established. The Chief Justice concluded that the men could not invoke the Fourth Amendment's protection because of “the purely commercial nature” of their behavior, their “relatively short period of time [spent] on the premises, and the lack of any previous connection” between the men and their host. 83 Justice Kennedy wrote a separate concurring opinion providing the fifth vote in Carter.84 Interestingly, Justice Kennedy noted that the “[s]ecurity of the home must be guarded by the law in a world where privacy is diminished by enhanced surveillance and sophisticated communication systems.”85 He also expressed his agreement with the dissenting Justices' view that reasonable expectations of the host “are shared, to some extent, by the guest.”86 For Justice Kennedy, this suggested a general rule: “social guests will 78 525 U.S. 83 (1998). Carter, 525 U.S. at 85. Id. at 86 81 Id. at 87. 82 Id. at 90. 83 Id. at 91. 84 Id. at 99. 85 Id. at 99 (Kennedy, J., concurring). Despite this professed concern about privacy being “diminished by enhanced surveillance and sophisticated communications systems,” Justice Kennedy dissented in Kyllo. Id. 86 Id. at 102. At the start of his opinion, Justice Kennedy explained that he joined the Chief Justice's opinion because “its reasoning is consistent with my view that almost all social guests have a legitimate expectation of privacy, and hence protection against unreasonable searches, in their host's home.” Id. at 99. 79 80 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 67 have an expectation of privacy in their host's home.”87 That said, however, Justice Kennedy concluded that Carter and Johns could not rely on the Fourth Amendment's protection because they had “nothing more than a fleeting and insubstantial connection” with their host's home.88 Justice Kennedy saw no reason “to fashion a per se rule of home protection, with an automatic right for all in the home to invoke the exclusionary rule, in order to protect homeowners and their guests from unlawful police intrusion.”89 Although Kyllo and Carter both addressed the degree of protection the Fourth Amendment provides for individuals located in a home, Kyllo's stress on the importance of brightline rules to protect the privacy of the home and to provide guidance for police contrasts sharply with the balancing analysis of Carter.90 Doubtlessly unintended, Justice Scalia's predilection for bright-line rules that protect the home is reminiscent of the per se rules that the Warren and Burger Courts established. In cases like Karo v. United States,91 Steagald v. United States,92 Payton v. New York,93 Mincey v. Arizona,94 Vale v. Louisiana,95 Stoner v. California,96 and Chapman v. United States,97 bright-line rules were announced to protect the privacy and security of the home. 98 Countervailing law enforcement interests can usually be found to justify a police intrusion of a home, especially when evidence of criminal conduct is discovered.99 In the past, the Court developed per se rules to pre-empt the ad hoc arguments frequently used to compromise Fourth 87 Id. at 102. Id. at 102. Id. at 103. 90 See supra notes 82-83 and accompanying text. 91 468 U.S. 705 (1984). 92 451 U.S. 204 (1981). 93 445 U.S. 573 (1980). 94 437 U.S. 385 (1978). 95 399 U.S. 30 (1970). 96 376 U.S. 483 (1964). 97 365 U.S. 610 (1961). 98 Minnesota v. Olson, 495 U.S. 91, 93 (1989), which held that an overnight guest is entitled to rely on the privacy of his host's home, is an example of a bright-line rule protecting homes announced by the Rehnquist Court. 99 In his dissent in Kyllo, Justice Stevens noted the “strong public interest” served by a thermal imager. See Kyllo, 533 U.S. at 45 (Stevens, J., dissenting) (“[P]ublic officials should not have to avert their senses or their equipment from detecting emissions in the public domain such as excessive heat, traces of smoke, suspicious odors, odorless gases, airborne particulates, or radioactive emissions, any of which could identify hazards to the community.”). 88 89 67 FILE:C:\WP51\72-1\MACLIN.DTP 68 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 Amendment interests. 100 Bright-line rules are also meant to provide guidance to the police; balancing models seldom afford such guidance. The reasoning of the Chief Justice and Justice Kennedy in Carter illustrate the dangers of balancing. How is an officer to know in advance whether his “Peeping-Tom” observations are directed at a guest or visitor who is entitled to share his host's privacy? Whether a person is entitled to constitutional protection against arbitrary police snooping should not depend on information that is later discovered by the police. Nor should the constitutionality of an officer's snooping turn on the length of a person's visit or whether he stays overnight. “Otherwise, a homeowner's sexual partner would have no expectation of privacy in the home and no standing to object if the police peered through the closed blin ds of a bedroom window, unless that sexual partner spent the night.”101 More importantly, the ad hoc balancing analysis in Carter undermines the security of private homes. The result in Carter, as Professor Susan Bandes notes “encourages . . . searches of homes that invade the privacy of homeowners, so long as it is the visitor, not the homeowner, who is caught with contraband.”102 In sum, Justice Scalia's decision in Kyllo to adopt a bright-line rule protecting “all details” of the home, no matter how insignificant the information, calls to mind an earlier judicial attitude about Fourth Amendment rules that affect the home and is a notable change of direction from the 100 See, e.g., Mincey v. Arizona, 437 U.S. 385, 393 (1978) (noting that the importance of the state's interest in prompt investigation of a murder, but explaining that a similar interest is extant for other serious crimes; “[i]f the warrantless search of a homicide scene is reasonable, why not the warrantless search of the scene of a rape, a robbery, or a burglary? `No consideration relevant to the Fourth Amendment suggests any point of rational limitation' of such a doctrine.”) (quoting Chimel v. California, 395 U.S. 752, 766 (1969)). 101 Tracey Maclin, What Can Fourth Amendment Doctrine Learn from Vagueness Doctrine?, 3 U. P A. J. CONST. L. 398, 434-35 (2001) (footnote omitted). Professor LaFave takes a different view of the impact of Carter. According to LaFave: Carter should not be taken to mean, with regard to a social guest, that if something less than an overnight stay will suffice, the stay must be longer than the [two-and-a-half] hour visit in that case. This is because the Court acknowledged that the situation there fell somewhere between that of the Olson overnight guest (who had standing) and one who `merely' is lawfully present (without standing by virtue of the repudiation of [Jones v. United States, 362 U.S. 257 (1960)]), and then held it to be closer to the latter only after factoring in the lesser expectation of privacy that attends `property used for commercial purposes.' There is no reason why a much shorter-term social visitor should be deemed to lack standing. Id. at 5 L AF AVE, supra note 70, § 11.3 at 23. 102 Bandes, supra note 25 at 1381 (footnote omitted). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 69 Court's most recent ruling involving the protection afforded private homes. C. Both cases rest on simple, but persuasive logic A final characteristic that Katz and Kyllo share is that both cases based their conclusions on a simple, but persuasive, logic. In Katz, Justice Stewart explained that a person who enters a telephone booth, “shuts the door behind him, and pays the toll that permits him to place a call is surely entitled to assume that the words he utters into the mouthpiece will not be broadcast to the world.”103 A contrary view would “ignore the vital role that the public telephone has come to play in private communication.”104 In Kyllo, the crucial factor was that the thermal imaging device enabled the government to discover information about the inside of a home that was otherwise unavailable without a physical intrusion. 105 For Justice Scalia, the legal question in Kyllo was straightforward: Should the government be free to gather any detail concerning the inside of someone's home without complying with the requirements of the Warrant Clause? In answering this inquiry, Justice Scalia saw a direct link between thermal imaging and the intrusions that writs of assistances and general warrants authorized, which prompted the Framers to adopt the Fourth Amendment. 106 When viewed from this perspective, the answer was clearly “no.” A contrary view would compromise “that degree of privacy against government that existed when the Fourth Amendment was adopted.”107 103 Katz v. United States, 389 U.S. 347, 352 (1967); see also id. at 361 (Harlan, J., concurring) (same). 104 Id. Professor Lewis Katz nicely summarizes why Katz has been viewed as a “seminal” case. “A seminal case should provide a framework for its later application. However, the seminal quality of Katz lies in its understanding of what the [F]ourth [A]mendment is about rather than in the clarity of its rule.” Lewis R. Katz, In Search of a Fourth Amendment for the Twenty-first Century, 65 IND. L. J. 549, 562 (1990). 105 See supra note 73 and accompanying text. 106 Kyllo, 533 U.S. at 40 (noting that although the compromise of Kyllo's privacy was insignificant, that fact is unimportant: “we must take the long view, from the original meaning of the Fourth Amendment forward”). 107 Id. at 34. 69 FILE:C:\WP51\72-1\MACLIN.DTP 70 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL II. THE LONG-TERM IMPACT OF KATZ [VOL. 72 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 71 The above discussion establishes th at Katz and Kyllo share certain common traits. Whether Kyllo's long-term impact will be similar to the influence of Katz is currently unknown. Although Kyllo's influence has yet to be determined, one can still make predictions about its effect on future Fourth Amendment doctrine. However, before considering Kyllo's potency for the future, it may be instructive to recall the influence of Katz. The following section demonstrates that Katz's impact on protecting Fourth Amendment liberties, particularly when technological innovations threaten those liberties, has been insignificant because Katz itself lacked substance. A lack of substance, however, was not the only factor contributing to Katz's failure to protect Fourth Amendment liberties. The Justices who decided Katz could not agree on Katz's meaning. This lack of consensus about a “landmark” case would make it easier for future Justices to dismiss the relevance of Katz in subsequent disputes concerning the Amendment's reach. To the extent that Kyllo contains similar defects, its capability and strength to protect Fourth Amendment interests against technological advances may prove to be doubtful. A. Katz's Lack of Substance As described earlier, the reasoning and holding in Katz rested on three factors. First, the Court dismissed the importance of determining whether a telephone booth is a “constitutionally protected area.”108 Second, the Court rejected the “trespass” rule of prior cases. 109 Third, the Court emphasized the practical and vital role that public telephones play in private communications. 110 Taken together, these factors moved the Court to find that “a person in a telephone booth may rely upon the protection of the Fourth Amendment.”111 The factors cited in Katz lead to the sensible result that telephone conversations are entitled to constitutional protection.112 But when these factors are removed from the facts in Katz, their usefulness for deciding the scope of the Fourth Amendment's protection in other 108 109 110 111 112 Katz, 389 U.S. at 351. Id. at 352-53. Id. at 359. Id. at 352. Id. at 357. 71 FILE:C:\WP51\72-1\MACLIN.DTP 72 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 contexts becomes illusory. Consider, for example, Katz's rejection of the litigants' efforts to determine whether a telephone booth was a “constitutionally protected area.”113 Justice Stewart asserted that focusing on whether a telephone booth is a constitutionally protected place “deflects attention from the problem presented by the case.”114 He then wrote his famous epigram: “[T]he Fourth Amendment protects people, not places.”115 This statement, while literally true, begs the question.116 More importantly, asserting that the Amendment protects “people, not places,” provides no guidance for determining, in future cases, when the Amendment protects people. 117 T h e e m p t i n e s s o f J u s t i c e S t e w a r t ' s q u i p undoubtedly prompted Justice Harlan's clarification regarding the Amendment's scope. Justice Harlan noted that simply asserting “the Fourth Amendment protects people, not places” tells us nothing because the crucial question “is what protection it affords to those people.”118 According to Justice Harlan, “the answer to that question [generally] requires reference to a `place.'”119 However, if one accepts Justice 113 Id. at 351. Id. Id. 116 See, e.g., Amsterdam, supra note 23 at 385 (noting that the formula in Katz “begs the question. But I think it begs the question no more or less than any other theory of fourth amendment coverage the Court has used.”). See also 1 L AF AVE, supra note 21, § 2.1(b) at 385. Professor LaFave remarks: [I]t can hardly be said that the [Katz] Court produced clarity where theretofore there had been uncertainty. If anything, the exact opposite has occurred. The pre-Katz rule, though perhaps `unjust,' was `a workable tool for the reasoning of the courts.' But the Katz rule, which the Court has since—somewhat inaccurately—stated as the `reasonable “expectation of privacy”' test, is by comparison `difficult to apply.' In short, the Katz `opinion offers little to fill the void it has thus created.' 1 L AF AVE, supra note 21, at 385 (footnotes omitted). 117 See, e.g., Clancy, supra note 1, at 339 (arguing that the Katz analysis has “no textual support in the language of the amendment” and thus “leaves the fluid concept of privacy to the vagaries of shifting Court majorities, which are able to manipulate the concept to either expand or contract the meaning of the word at will”) (footnote omitted); Katz, supra note 104, at 559-60 (“[Justice Stewart's opinion] freed the [F]ourth [A]mendment from the chains imposed by the property limitation and the requirement of a physical trespass but provided modest guidance for determining the justiciability of an expectation of privacy in other contexts.”). Cf. Ku, supra note 1, at 1346 (arguing that “by failing to provide any real guidance to the privacy value, [Katz] did not shut the door to examining [the means used by government agents], and subsequent decisions have taken advantage of this opening, artfully transforming the reasonable expectation of privacy test into a means-oriented analysis”) (footnote omitted). 118 Katz, 389 U.S. at 361 (Harlan, J., concurring). 119 Id. See also David A. Harris, Superman's X-Ray Vision and the Fourth Amendment: The New Gun Detection Technology, 69 T EMP. L. REV. 1, 18 (1996) (explaining that after Katz “Fourth Amendment protection depends not only on 114 115 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 73 Harlan's reinterpretation of Katz, then, as Professor Sklansky observes, “the most famous words in Katz seem drained of most of their content.”120 As Justice Harlan and others have recognized, Katz's replacement for the concept of a “constitutionally protected area”—asserting that the “Fourth Amendment protects people, not places”—was a constitutional norm without substance. Because it is essentially meaningless, the norm that symbolizes the spirit and meaning of Katz, ironically, has proved to be quite ineffective, as a practical matter, in protectin g people. Katz's malleability and emptiness made it especially vulnerable in cases involving technological change. For example, within three years of the Katz decision, the Court confronted an issue that had divided the Justices in 1952. In United States v. White,121 the Court had to decide whether the testimony of federal officers concerning conversations between the defendant and a government informant, which the officers monitoring the frequency of a radio transmitter that the informant carried overheard, implicated the Fourth Amendment. 122 Like On Lee, White ruled that the officers' electronic surveillance was not a search. Speaking for a plurality of the Court, Justice White explained the result with a syllogism: If a person assumes the risk that a secret government spy, acting without electronic equipment, might later reveal the contents of a conversation, the risk is the same when the spy simultaneously records and transmits the conversation to a government officer.123 In both situations, “the risk is his,” and the Fourth Amendment provides no protection against government conduct to obtain information in this manner.124 For the White plurality, Katz was irrelevant. 125 “Although how an individual protects his privacy, but where and in what situation he does so”). 120 Sklansky, supra note 24 at 158; cf. Ric Simmons, From Katz to Kyllo: A Blueprint for Adapting the Fourth Amendment to Twenty-First Century Technologies, 53 HASTINGS L.J. 1303, 1312 (noting that Justice Harlan's reformation of the rule of Katz “sits somewhat awkwardly alongside the majority opinion and makes it more difficult to give meaning to the vague `reasonable expectations of privacy' test). 121 401 U.S. 745 (1971). 122 White, 401 U.S. at 746-47. 123 See id. at 751-52 (plurality opinion). 124 Id. at 752-53. 125 Justice White distinguished Katz this way: Katz involved no revelation to the Government by a party to 73 FILE:C:\WP51\72-1\MACLIN.DTP 74 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 Katz announced that the Court would no longer be controlled by rigid and antiquated concepts when formulating the scope of the Fourth Amendment, the White plurality read Katz as having no impact on the secret spy cases”126 decided before Katz. The White plurality, without any discussion or analysis of the doctrinal shift announced in Katz, reaffirmed prior holdings that authorized unchecked surveillance of private conversations and unbridled invasions of private homes and offices whenever informants are available to gather information for the government. If the “Fourth Amendment protects people, and not places,” as Katz insisted, then why is the Amendment inapplicable against government efforts to record conversations or infiltrate homes or offices using secret informants? If the Fourth Amendment restrains the discretion of the police to wiretap or `bug' private conversations [conducted in telephone booths], it is not apparent why that same provision is inapplicable when the police monitor and record private conversations through the use of a secret informant deliberately position[ed] to hear those conversations. After all, a secret informant acts as a `human bug' for the government.127 The result in White proved that Katz offered no protection against this type of unchecked government electronic surveillance. Katz's announcement that “the Fourth Amendment protects people, not places,” also did not protect people from the unbridled use of electronic surveillance employed in Smith v. Maryland.128 The question Smith presented was whether the installation and use of a pen register was a search under the Amendment. 129 The Court ruled that the pen register was not a search. Smith distinguished a pen register conversations with the defendant nor did the Court indicate in any way that a defendant has a justifiable and constitutionally protected expectation that a person with whom he is conversing will not then or later reveal the conversation to the police. Id. at 749. Put simply, the Fourth Amendment does not cover eavesdropping by the government with the connivance of one of the parties. 126 Tracey Maclin, Informants and the Fourth Amendment, 74 WASH. U. L. Q. 573, 620-21 (1996) (footnote omitted) [hereinafter Maclin, Informants]. 127 Maclin, Informants, supra note 126, at 625. 128 442 U.S. 735 (1979). 129 The Court explained that a pen register “`is a mechanical device that records the numbers dialed on a telephone by monitoring the electrical impulses caused when the dial on the telephone is released. It does not overhear oral communications and does not indicate whether calls are actually completed.'” Smith, 442 U.S. at 736, n.1 (quoting United States v. N.Y. Tel. Co., 434 U.S. 159, 161, n.1 (1977)). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 75 from wiretapping on several grounds. 130 The crux of the Court's logic, however, can be quickly summarized: The Fourth Amendment is not implicated because a person has no legitimate privacy interest in the telephone numbers he dials. The person assumes the risk that the telephone company will convey the numbers he dials to the government. The Court was indifferent to the fact that technological innovations granted the government greater and more proficient access to information about a person's private communications. 131 In the Court's view, contemporary telephone equipment, including pen registers, is “merely the modern counterpart of the operator who, in an earlier day, personally completed calls for the subscriber.”132 Noting that a person would have no legitimate privacy interest in the numbers he dialed if an operator processed those calls, the Court was “not inclined to hold that a different constitutional result is required because the telephone company has decided to automate.”133 Smith did proclaim, unlike the White plurality, that Katz was its “lodestar” for determining whether governmentinitiated electronic surveillance triggered Fourth Amendment scrutiny.134 But the protective shield of Katz was just as ineffective in Smith as it was in White. When Katz stated “the Fourth Amendment protects people, not places,” criticism of this norm was muted because the majority of the Justices (like the majority of the nation) thought that private telephone conversations should be constitutionally protected. The emptiness of this norm, however, created a vacuum that the Court would have to fill in later cases where there was greater controversy about the challenged police practice. As 130 Smith distinguished wiretapping from a pen register in the following ways. First, unlike a listening device, a pen register “do[es] not acquire the contents of communications.” Id. at 741. Literally speaking, pen registers are not “recording devices” because they do not “`hear sound.'” Id. (quoting United States v. N.Y. Tel. Co., 434 U.S. 159, 167 (1977)). Furthermore, unlike listening devices, pen registers do not record “`any communication between the caller and the recipient of the call, [disclose the] identities [of the callers], [or tell] whether the call was even completed.'” Id. 131 In his dissenting opinion, Justice Stewart notes that: “[t]he numbers dialed from a private telephone—although certainly more prosaic than the conversation itself are not without `content.'” Id. at 748 (Stewart, J., dissenting). Pen registers reveal, “the identities of the persons and the places called, and thus reveal the most intimate details of a person's life.” Id. (Stewart, J., dissenting). 132 Id. at 744. 133 Id. at 745. 134 Id. at 739. 75 FILE:C:\WP51\72-1\MACLIN.DTP 76 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 those cases emerged, the Court needed legal theories to support controversial results that divided the Justices. The post-Katz Court used the expectations theory 135 and risk analysis to define the scope of the Fourth Amendment. The same assumption of risk theory supporting White's holding supported Smith's holding. As Justice Stewart belatedly recognized, however, “[i]t is simply not enough to say, after Katz, that there is no legitimate expectation of privacy in the numbers dialed because the caller assumes the risk that the telephone company will disclose them to the police.”136 Regrettably, Justice Stewart's realization came too late.137 By 1979, Katz's famous words were a meaningless slogan, often cited but lacking principle and influence. Expectations theory and risk analysis replaced Katz as the defining methodology 135 See Katz v. United States, 389 U.S. 347, 361 (1967) (Harlan, J., concurring) (explaining his view of the rule that has emerged through prior decisions is that “there is a twofold requirement, first that a person have exhibited an actual (subjective) expectation of privacy and, second, that the expectation be one that society is prepared to recognize as `reasonable'”). In White, Justice Harlan appeared to recant his endorsement of expectations theory as a tool for measuring the Fourth Amendment's scope. See, United States v. White, 401 U.S. 745, 786 (1971) (Harlan, J., dissenting) (explaining that legal analysis in this context must “transcend the search for subjective expectations or legal attribution of assumptions of risk. Our expectations, and the risks we assume, are in large part reflections of laws that translate into rules the customs and values of the past and present.”); see also, Amsterdam, supra note 23, at 384 (“Justice Harlan himself later expressed second thoughts about [expectations theory], and rightly so. An actual, subjective expectation of privacy obviously has no place in a statement of what Katz held or in a theory of what the fourth amendment protects. It can neither add to, nor can its absence detract from, an individual's claim to fourth amendment protection.”). 136 Smith, 442 U.S. at 747 (Stewart, J., dissenting). Justice Stewart argued that Smith's risk analysis was inconsistent with Katz. He also contended that risk analysis was a flawed legal theory because it proved too much. Telephone conversations: must be electronically transmitted by telephone company equipment, and may be recorded or overheard by the use of other company equipment. Yet we have squarely held that the user of even a public telephone is entitled `to assume that the words he utters into the mouthpiece will not be broadcast to the world.' Id. at 746-47 (Stewart, J., dissenting) (quoting Katz, 389 U.S. at 352). Why shouldn't a caller assume the risk that his conversation may be turned over to the government, just as the numbers he dials may be conveyed to the government? People do not assume that risk, or assume the risk that our mail may be opened and read by government officers, because the Court has said we do not have to assume those risks. Risk analysis is not based on a neutral principle. We assume only those risks the Court says we must assume. See KAMISAR ET AL., supra note 18 at 380 (citation omitted) (noting that we do not assume the risk that our telephone calls or mail is being monitored because the Court has ruled that the government may not conduct such surveillance). 137 Interestingly, Justice Stewart had joined the plurality opinion in White which, as noted in the text, relied on the assumption of risk theory to support the holding. See generally White, 401 U.S. at 745-54 (plurality opinion). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 77 for measuring the Fourth Amendment's protection.138 The second factor supporting Katz's reasoning and holding adopted the view that “the reach of [the Fourth Amendment] cannot turn upon the presence or absence of a physical intrusion into any given enclosure.”139 Rejection of the “trespass” rule heralded a new model of search and seizure jurisprudence.140 Common-law property rules would no longer dominate the debate about the scope and meaning of the Fourth Amendment. Without being tethered to archaic rules, the Court was free to conduct a modern and realistic assessment about which police practices should be subject to constitutional scrutiny. But loosening the connection between search and seizure law and common-law rules did not enhance Katz's authority to protect Fourth Amendment interests in future cases. Indeed, besides the outcome in Katz itself, rejection of the trespass rule rarely made a difference in search and seizure rulings. Rejection of the “trespass” rule ignited no real 138 See United States v. Miller, 425 U.S. 435 (1976). Miller ruled that a government subpoena of bank checks and deposit slips from banks did not constitute a search. The Court explained that the “depositor takes the risk, in revealing his affairs to another, that the information will be conveyed by that person to the Government.” Id. at 443. The “assumption of risk” rule applies “even if the information is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in third party will not be betrayed.” Id. For a detailed discussion of the Court's analysis in Smith, see Clifford S. Fishman, Pen Registers and Privacy: Risks, Expectations, and the Nullification of Congressional Intent, 29 CATH . U. L. REV. 557, 561 (1980) (noting that “[a]lthough the result in Smith is supportable under the particular facts of the case, the Court's reasoning poses significant problems of both statutory and constitutional dimensions”); id. at 569 (asserting that Smith's “reliance on Miller to support an assumption of risk rationale in the context of electronic surveillance is rather tenuous”). Professor Daniel Solove describes the constitutional framework established by risk analysis as the “new Olmstead.” Although we have moved from the Boyd [v. United States, 116 U.S. 616 (1886)] and Olmstead world of physical papers and places to a new regime based upon expectations or privacy, there is a new Olmstead, one that is just as shortsighted and rigid in approach. The Court's new conception of privacy is one of total secrecy. If any information is exposed to the public or if law enforcement officials can view something from any public vantage point, then the Court has refused to recognize a reasonable expectation of privacy. Daniel J. Solove, Digital Dossiers and the Dissipation of Fourth Amendment Privacy, 75 S. CAL. L. REV. 1083, 1133 (2002). 139 Katz, 389 U.S. at 353. 140 See, e.g., L AF AVE, supra note 21, § 2.2 (c) at 418 (describing Katz's disapproval of the trespass rule as a “dramatic shift [which] made it quite clear that the earlier [lower court] decisions upholding the use of telescopic devices by reliance upon Goldman [v. United States, 316 U.S. 129 (1942)] and Hester [v. United States, 265 U.S. 57 (1924)] could no longer be safely relied upon”). 77 FILE:C:\WP51\72-1\MACLIN.DTP 78 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 controversy among the Justices in Katz.141 One explanation for this consensus may be that the trespass rule specifically, and common-law property rules generally, no longer exerted influence on search and seizure doctrine. Since at least the 1950's, the persuasive quality of these rules waned. “The validity of the trespass rationale was questionable even at the time [On Lee] was rendered” in 1952.142 Rulings subsequent to On Lee further eroded the property-based foundations of Fourth Amendment law.143 As Justice Harlan explained, search and seizure doctrine immediately prior to Katz demonstrated “no tolerance for the old dividing lines resting, as they did, on fiction and common-law distinctions without sound policy justification in the realm of values protected by the Fourth Amendment.”144 Under this view, the Katz opinion, rather than initiating a fundamental shift, was merely a final and formal acknowledgement that the trespass rule had outlived its usefulness. 145 Moreover, the trespass or physical penetration concept was quickly becoming obsolete. Technological change was allowing government officials to obtain information without physical intrusions into constitutionally protected areas. Dog sniffs, airplanes and electronic beepers were a small sample of the types of technological advances that enabled the government to obtain information without physical intrusion. When litigants raised constitutional challenges against these investigative devices, the Court responded as if it had not 141 Even Justice Black, the sole dissenter in Katz, did not object when the Court jettisoned the trespass rule. See Katz, 389 U.S. at 368-69 (Black, J., dissenting) (explaining that the presence or absence of a trespass was not determinative in the pre-Katz cases). 142 White, 401 U.S. at 774 (Harlan, J., dissenting); see also, Katz, supra note 104 at 558 (noting that by 1960, dissatisfaction with the trespass doctrine was being expressed within the Court and by legal academics). 143 See, e.g., Warden v. Hayden, 387 U.S. 294 (1967). Seven months prior to Katz, Hayden stated: The premise that property interests control the right of the Government to search and seize has been discredited. Searches and seizures may be `unreasonable' within the Fourth Amendment even though the Government asserts a superior property interest at common law. We have recognized that the principal object of the Fourth Amendment is the protection of privacy rather than property, and have increasingly discarded fictional and procedural barriers rested on property concepts. Hayden, 387 U.S. at 304 (citing Jones v. United States, 362 U.S. 257, 266 (1960) and Silverman v. United States, 365 U.S. 505, 511 (1961)). 144 White, 401 U.S. at 778 (Harlan, J., dissenting). 145 Cf., id. at 780 (Harlan, J., dissenting) (“Viewed in perspective, then, Katz added no new dimension to the law. At most it was a formal dispatch of Olmstead and the notion that such problems may usefully be resolved in the light of trespass doctrine, and, of course, it freed from speculation what was already evident, that On Lee was completely open to question.”). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 79 decided Katz. For example, in United States v. Place,146 the Court concluded that exposing personal luggage to a narcotics detection dog was not a “search.”147 Place concluded “the canine sniff is sui generis.”148 It does not “require opening the luggage” and “discloses only the presence or absence of narcotics, a contraband item.”149 The analytical tension between Place and Katz is manifest. Why does it matter that the dog sniff does not require opening of luggage? After all, Place recognized that “a person possesses a privacy interest in the contents of personal luggage that is protected by the Fourth Amendment,”150 and conceded that “the sniff tells the authorities something about the contents of the luggage, [although] the information . . . is limited.”151 The absence of a physical intrusion does not diminish a person's privacy interest in his luggage, just as the absence of a physical intrusion into a telephone booth did not diminish Katz's interest in the privacy of his telephone conversations. More importantly, Katz instructed that Fourth Amendment protection does not turn on the presence or absence of a physical intrusion. Thus, the “manner” of the police intrusion 462 U.S. 696 (1983). Place, 462 U.S. at 707. 148 Id. Not surprisingly, “canine sniffs turned out not to be sui generis at all.” Harris, supra note 119, at 30, n.177. The next year, in United States v. Jacobsen, 466 U.S. 109 (1984), the Court employed the logic of Place to find that a chemical field test of powdery substance did not constitute a search. Because the chemical test—like the canine sniff—only revealed whether the powder was cocaine or not, no Fourth Amendment interests were triggered. Jacobsen 466 U.S. at 123-24. “The [Jacobsen] Court also extended the reach of Place, by saying that the search not only disclosed a limited amount of information, but also that it disclosed only a type of information—the presence of absence of cocaine—in which there could be no legitimate expectation of privacy.” Harris, supra note 119, at 31. 149 Place, 462 U.S. at 707. Place explained that because there was no physical intrusion, the dog sniff “does not expose noncontraband items that otherwise would remain hidden from public view, as does, for example, an officer's rummaging through the contents of the luggage. Thus, the manner in which information is obtained through this investigative technique is much less intrusive than a typical search.” Id. 150 Id. at 707 (citing United States v. Chadwick, 433 U.S. 1, 13 (1977)). 151 Id. As Professor Harris has noted, the canine sniff does not simply augment human capabilities. Although both man and dog can smell, the dog's nose was not simply a way to enhance what the human at the end of the leash could do. Rather, the canine nose is so much better-more sensitive and more accurate—than its human counterpart that it simply could not be said to replace it. Harris, supra note 119 at 24, n.137. 146 147 79 FILE:C:\WP51\72-1\MACLIN.DTP 80 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 in Place should be irrelevant. Likewise, California v. Ciraolo152 held that naked-eye aerial observation of an individual's backyard did not constitute a search. 153 Writing for a five Justice majority, Chief Justice Burger asserted no search occurred because the police observations “took place within public navigable airspace” in a “physically nonintrusive manner.”154 Again, Katz's impotence was evident. The dissent charged that the Chief Justice had ignored fundamental elements of Katz's reasoning. 155 Rather than address the obvious tension between his reasoning and Katz, the Chief Justice essentially confined the reach of Katz to a privilege against warrantless wiretapping. 156 According to the Chief Justice, the concerns of the Katz majority and Justice Harlan focused on electronic interception of telephone communications. “One can reasonably doubt that in 1967 [the Justices of Katz] considered an aircraft within the category of future `electronic' developments that could stealthily intrude upon an individual's privacy.”157 Once the Chief Justice disabled Katz in this way, it was easy to conclude that the Fourth Amendment does not bar naked eye aerial observation of a person's backyard. Finally, the result and reasoning of United States v. Knotts158 reveals the insignificance of Katz's proclamation that the Fourth Amendment's reach “cannot turn upon the presence of absence of a physical intrusion into any given 476 U.S. 207 (1986). Ciraolo, 476 U.S. at 213-14. 154 Id. at 213. 155 Justice Powell's dissent in Ciraolo complained that the majority was ignoring Justice Harlan's warning that any “decision to construe the Fourth Amendment as proscribing only physical intrusions by police onto private property `is, in the present day, bad physics as well as bad law, for reasonable expectations of privacy may be defeated by electronic as well as physical invasion.'” Id. at 215-16 (Powell, J., dissenting) (quoting Katz, 389 U.S. at 362 (Harlan, J., concurring)). Justice Powell also noted that the Ciraolo majority's reliance on the fact that the flyover was conducted in a physically nonintrusive manner directly contradicted Katz. Reliance on the manner of surveillance is directly contrary to the standard of Katz, which identifies a constitutionally protected privacy right by focusing on the interests of the individual and of a free society. Since Katz, we have consistently held that the presence or absence of physical trespass by police is constitutionally irrelevant to the question whether society is prepared to recognize an asserted privacy interest as reasonable. Id. at 223 (Powell, J., dissenting) (citation omitted). 156 See id. at 214. 157 Id. at 215. 158 460 U.S. 276 (1983). 152 153 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 81 enclosure.”159 Knotts was the Court's first “beeper” case.160 Law enforcement officers installed a beeper in a drum of chloroform that one of the defendants purchased in Minnesota. Visual and electronic surveillance enabled officers to monitor the whereabouts of the drum as it traveled from Minnesota to Wisconsin. The officers eventually discovered that the beeper signal was stationary and situated near a secluded cabin. A subsequent search of the cabin pursuant to a warrant, based in part on the information the officers had obtained while monitoring the beeper, disclosed a drug laboratory. The issue in Kn otts was whether the monitoring was a search. Relying upon the lesser expectation of privacy associated with cars, Knotts first stated that a “person traveling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another.”161 The Court then addressed whether the use of electronic detection equipment triggered Fourth Amendment interests. As in the other post-Katz cases that posed conflicts between technology and Fourth Amendment rights, the Knotts Court did not see Katz's reasoning as placing any constitutional restraints on police use of beepers. In fact, Knotts's logic proceeded as if the Court had never heard of Katz. According to then-Justice Rehnquist, the author of Knotts, “[n]othing in the Fourth Amendment prohibited the police from augmenting the sensory faculties bestowed upon them at birth with such enhancement as science and technology afforded them in this case.”162 This statement, however, contradicts Katz itself.163 Katz, 389 U.S. at 353. The Court described the “beeper” as “a radio transmitter, usually battery operated, which emits periodic signals that can be picked up by a radio receiver.” Knotts, 460 U.S. at 277. The Court's second beeper case was Karo v. United States, 468 U.S. 705 (1984). For a comprehensive and informative analysis of Knotts and Karo, see Clifford S. Fishman, Electronic Tracking Devices and the Fourth Amendment: Knotts, Karo, and the Questions Still Unanswered, 34 CATH . U. L. REV. 277 (1985); Melvin Gutterman, A Formulation of the Value and Means Models of the Fourth Amendment in the Age of Technologically Enhanced Surveillance, 39 SYRACUSE L. REV. 647, 699-707 (1988). 161 Knotts, 460 U.S. at 281. 162 Id. at 282. 163 See id. at 288 (Stevens, J., concurring). In Knotts, Justice Stevens stated that the electronic augmentation “was unobjectionable, [but] it by no means follows that the use of electronic detection techniques does not implicate especially sensitive concerns.” Id. Professor Fishman, who generally supports the result in Knotts, agrees with Justice Stevens' concern that sense-enhancement 159 160 81 FILE:C:\WP51\72-1\MACLIN.DTP 82 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 Under Justice Rehnquist's reasoning, the Fourth Amendment provides no protection against electronic or technological devices that enhance human senses, even when electronic surveillance is indispensable to the government's ability to gather information. Because the officers in Knotts were unable to maintain visual surveillance of the drum as it traveled from Minnesota to Wisconsin, the beeper allowed them to locate the chloroform “when they would not have been able to do so had they relied solely on their naked eyes.” 1 6 4 Justice Rehnquist, however, concluded that “scientific enhancement of this sort raises no constitutional issues which visual surveillance would not also raise.”165 In other words, because an officer in a car (or in a helicopter) 166 theoretically could have maintained visual observation of the drum as it traveled across the country without triggering constitutional protection, no constitutional concerns are raised if that officer utilizes electronic equipment to accomplish the same task. In a technologically advanced society, acceptance of Justice Rehnquist's rationale in Knotts—equating electronic surveillance with what police might theoretically accomplish with naked eye monitoring—means that the Fourth Amendment will protect very little.167 In the theoretical world, one can always imagine methods in which the police are able to watch, listen, or even smell, the activities of a suspect in order to detect useful information. In the real equipment raise especially sensitive issues. Fishman, supra note 160, at 323. But Professor Fishman also believes that the Knotts majority was aware of the potential dangers posed by technological enhancement, and thus wrote a narrow opinion that authorized only the specific surveillance at issue in that case. Fishman, supra note 160, at 323. 164 Knotts, 460 U.S. at 285. Cf. Fishman, supra note 160, at 324, n.194 (acknowledging that the police did not learn of the defendant's destination by visual surveillance). 165 Knotts, 460 U.S. at 285. 166 At one point in their surveillance of the defendant's automobile, the defendant took evasive action and the officers ended their visual surveillance. “At about the same time officers lost the signal from the beeper, but with the assistance of a monitoring device located in a helicopter the approximate location of the signal was picked up again about one hour later.” Knotts, 460 U.S. at 278. 167 Professor LaFave's reaction to Knotts has been more polite. “It is this assumed equivalence between mere `visual surveillance' and `scientific enhancement' in Knotts which is troublesome.” L AF AVE, supra note 21, §2.7(e) at 645. Professor LaFave properly notes what Justice Rehnquist refused to admit: “The use of an electronic tracking device permits a much more extended and thorough surveillance of an individual than would otherwise be possible.” L AF AVE, supra note 21, §2.7(e) at 645. Cf. Ku, supra note 1, at 1348 (noting that the practical impact of Knotts allows “government to monitor any individual outside of the home twenty-four hours a day without any discussion of how that monitoring might affect the individual or what that surveillance might do to the relationship between government and individual”) (footnote omitted). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 83 world, however, police investigative methods are subject to financial, personnel and political restraints. The scope of the Fourth Amendment should not be measured by a judge's ability (or inability) to conjure hypothetical scenarios in which an individual's activities are monitored by police who are able to “augment[] the sensory faculties bestowed upon them at birth with such enhancement as science and technology” permits. 168 Otherwise, very few human activities will be beyond the government's surveillance capabilities. The leeway given the police under Knotts's reasoning is illustrated by applying Knotts's rationale to a “hypothetical” Katz case. Under Knotts's logic, the result in Katz is uncertain.169 Conceivably, lip-reading FBI agents could watch and transcribe what they saw as Katz spoke in a glass enclosed phone booth. If Katz became aware of the agents' presence and covered his lips, presumably, under the analysis of Knotts, the agents could turn on a wiretap to augment their sensory faculties without triggering Fourth Amendment scrutiny. Just as the officers in Knotts used electronic equipment—without triggering constitutional safeguards—to discover the location of the chloroform “when they would not have been able to do so had they relied solely on their naked eyes,”170 lip-reading FBI agents could have also used electronic surveillance to ascertain Katz's communications when they “would not have been able to do so had they relied solely on their naked eyes.”171 In either case, “[n]othing in the Fourth Amendment prohibited the police [or FBI] from augmenting the sensory faculties bestowed upon them at birth with such enhancement as science and technology afford[s].”172 As Justice Rehnquist suggested in Knotts , “scientific enhancement of this sort raises no constitutional issues which Knotts, 460 U.S. at 282. Cf. 1 L AF AVE, supra note 21, § 2.7(e) at 646, n.114 (“[A] Smith-Knotts type of analysis could well have produced the result that Katz lacked an expectation of privacy because what he said could have been determined by a lip reader some distance away or by a hypothetical bystander immediately adjacent to the booth.”). 170 Knotts, 460 U.S. at 285. 171 Id. See also J OSHUA DRESSLER & GEORGE C. T HOMAS III, CRIMINAL P ROCEDURE: P RINCIPLES, P OLICIES AND P ERSPECTIVES 88 (1999) (asking whether the result in Katz would be the same if FBI agents “had positioned a lip reader immediately outside the telephone booth who observed Katz's lips and recorded his words on paper”). 168 169 172 Knotts, 460 U.S. at 282. 83 FILE:C:\WP51\72-1\MACLIN.DTP 84 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 visual surveillance would not also raise.”173 At bottom, Knotts's reasoning raises doubts about the protection that Katz provided.174 As in Smith v. Maryland, Place and Ciraolo, the reasoning of Knotts shows that Katz's rejection of the trespass rule has had little impact on subsequent search and seizure cases involving technological and scientific innovations. Before it was finally overruled, the trespass rule had lost its influence among the Justices. Even if Katz had not reversed the trespass rule, law enforcement investigative methods, with the aid of technology, were advancing at such a rapid pace that the government could obtain various types of information without a physical intrusion into a constitutionally protected a r e a . T h u s , Katz's proclamation on this point was meaningless, and the Court's later decisions would show that Katz's reasoning would matter little when police utilized 173 Id. at 285. Professor Fishman does not agree with this criticism of Knotts. See Fishman, supra note 160, at 325. He notes: Surveillance of one's location and surveillance of one's words differ, not merely in degree, but in kind. Under most circumstances, a person's location and travel simply are not `private,' and surveillance, though potentially offensive, does not intrude as deeply or as dangerously into privacy and individual liberty as does surreptitious surveillance of what one says to friends, relatives and other confidants. Thus, it is not at all inconsistent for the Court to have held that electronic surveillance of communications is a search subject to Fourth Amendment protection, while also holding that electronic surveillance of public travel is not. Fishman, supra note 160, at 325 (footnote omitted). While reasonable minds might agree that the “location” surveillance in Knotts is not as intrusive as the communication surveillance in Katz, my criticism of Knotts is not focused on the degree or intrusiveness of the surveillance involved in that case. Rather, my point is to highlight the contrasting analytical methods between Knotts and Katz. As noted in the text, Knotts's analysis gives the police enormous latitude to monitor the activities of individuals. In some cases, the surveillance will be quite intrusive, as in the example of the lip-reading FBI agents who augment their sensory faculties with electronic equipment. In other cases, the surveillance may be insignificant, as Justice Stevens believed to be the case in Kyllo. See Kyllo v. United States, 533 U.S. 27, 43 (2001) (Stevens, J., dissenting) (noting that “the ordinary use of the senses might enable a neighbor or passerby to notice the heat emanating from a building”); Kyllo, 533 U.S. at 45 (arguing that police “should not have to avert their senses or their [sense-enhancing] equipment from detecting emissions in the public domain,” particularly when “the countervailing privacy interest is at best trivial”). In a third group of cases, reasonable minds might disagree about the intrusiveness involved when government officers are free to augment their sensory faculties with enhancement by scientific and technological devices. Compare Smith v. Maryland, 442 U.S. 735, 741 (opinion of Blackmun, J.) with Smith, 422 U.S. at 746-48 (opinion of Stewart, J., dissenting). In sum, the problem with the Court's analysis in Knotts is that it proves too much. Under Knotts's logic, the Fourth Amendment will be inapplicable if the government can convince a judge that the information revealed by the technological or scientific intrusion could have been detected by officers combining sense-enhancing equipment with their ordinary human senses. 174 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 85 other types of technological tools to gather information. The third and final factor that Katz emphasized was that “[o]ne who occupies [a phone booth], shuts the door behind him, and pays the toll that permits him to place a call is surely entitled to assume that the words he utters into the mouthpiece will not be broadcast to the world.”175 Katz explained that the warrantless wiretap violated “the privacy upon which [Katz] justifiably relied while using the telephone booth and thus constituted a `search an d seizure' within the meaning of the Fourth Amendment.”176 This aspect of Katz is nearly impossible to administer. As Professor LaFave comments, the “expectation” formula of Katz does not produce “clarity where theretofore there had been uncertainty. If anything, the exact opposite has occurred.”177 The rest of the Katz opinion, as the above discussion demonstrates, provides scant guidance on explaining when other individuals can “justifiably rel[y]” on the Fourth Amendment to protect them from warrantless government surveillance.178 In sum, because it lacks any type of principled norm, the expectations test, like the other two factors that Katz emphasized, does not provide a substantive model or neutral principle that protects Fourth Amendment liberties. 175 Katz v. United States, 389 U.S. 347, 352 (1967). Id. at 353. 1 L AF AVE, supra note 21, § 2.1(b) at 385. 178 See supra note 174 and accompanying text; see also, Kyllo, 533 U.S. at 34 (noting that Katz's expectations test “has often been criticized as circular, and hence subjective and unpredictable”) (citations omitted); L AF AVE, supra note 21, § 2.1(b) at 386 (explaining that “[a]lthough Katz unquestionably expands the coverage of the Fourth Amendment, even now—despite the intervening years since Katz was handed down—it is impossible to state with precision the degree of this expansion”); Gutterman, supra note 160, at 665 (noting that “[g]overnment conduct could be insulated from [constitutional] review when the precautions taken were not weighted sufficiently to earn privacy. The Katz promise had sowed its own seeds of destruction.”) (footnote omitted); cf. J EFFREY ROSEN, T HE UNWANTED GAZE: T HE DESTRUCTION OF P RIVACY IN AMERICA 63 (Random House 2000) (“[T]he real problem with the Supreme Court's test for invasions of privacy is not empirical but conceptual. In many cases, people have an objectively valid expectation of privacy that the Court, by judicial fiat, has deemed unjustifiable.”). 176 177 85 FILE:C:\WP51\72-1\MACLIN.DTP 86 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL B. The Justices Themselves Could Not Agree On [VOL. 72 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 87 The Meaning of Katz Because the three factors critical to the result in Katz were meaningless or insignificant, it is not surprising that Katz has been ineffective in protecting Fourth Amendment interests in cases not involving wiretapping or electronic bugging of private conversations. But the emptiness of these factors was not the only problem with Katz. Another flaw in Katz, although not immediately apparent in the Court's opinion, was the fact that the Justices who joined the result in Katz could not agree on its meaning. The inability of the Justices who decided Katz to agree on the scope and impact of their own decision diminished any expectation that Katz could have a lasting impact on Fourth Amendment liberties. Indeed, the discord over Katz, when combined with the emptiness of its legal framework, only increased the chances that future Justices would see Katz as a narrow precedent regarding the Fourth Amendment's scope in a scientific and technologically advanced society. Although few would realize the point until much later, the scope of Katz's holding was in doubt on the day the Court rendered its decision. In his concurring opinion, Justice White asserted that Katz left undisturbed a line of cases dealing with informants and wired spies. 179 According to Justice White, when a person speaks to another, the speaker “takes all the risks ordinarily inherent in so doing, including the risk that the man to whom he speaks will make public what he has heard.”180 The Fourth Amendment affords no protection against “unreliable (or law-abiding) associates.”181 A sensible extension of this rule, according to Justice White, leads to the conclusion that a speaker also assumes the risk “that his hearer, free to memorize what he hears for later verbatim repetitions, is instead recording it or transmitting it to another.”182 Katz, on the other hand, dealt with “an entirely different situation” because Katz attempted to exclude uninvited listeners and “spoke un der circumstances in which a reasonable person would assume that uninvited ears were not listening.”183 179 180 181 182 183 Katz, 389 U.S. at 363, n.* (White, J., concurring). Id. (White, J., concurring). Id. Id. Id. 87 FILE:C:\WP51\72-1\MACLIN.DTP 88 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 Justice White's comments sought to bolster the “assumption of risk” analysis that supported On Lee. When Katz was decided, no member of the Katz majority challenged Justice White's interpretation of Katz's holding. Four years later, however, an influential member of the Katz majority challenged Justice White's understanding of Katz's impact on the wired spy cases. Justice Harlan, the author of what later became known as the “Katz analysis”184 or “Katz test,”185 disputed Justice White's interpretation of Katz in United States v. White.186 On this occasion, however, Justice White's views on Katz's meaning would prevail over the views of Justice Harlan. White reaffirmed On Lee's holding that governmental use of a wired spy to record the conversations of an individual is not a search under the Fourth Amendment. As noted earlier, Justice White's plurality opinion in White relied upon the assumption of risk theory to explain why an individual has no constitutionally protected interests against government use of wired informants. Not surprisingly, Justice White read Katz's holding, as he did in his concurring opinion in Katz, as not affecting the rationale supporting On Lee or Lopez.187 In contrast, Justice Harlan's dissent in White argued that subsequent cases had eroded the “doctrinal foundations” of On Lee. According to Justice Harlan, Katz, in combination with other rulings decided in the 1960's, not only expunged the property-law doctrine that previously controlled the results in search and seizure cases, it also cast serious doubt on the continuing validity of cases like On Lee and Lopez.188 The reasoning in Katz, following closely on the heels of Berger, signaled a heightened judicial awareness of the dangers that technology posed to individual privacy. Indeed, even without Katz, the Court had already changed direction on the constitutionality of electronic surveillance. 184 Smith v. Maryland, 442 U.S. 735, 741 (1979) (referring to Justice Harlan's concurrence in Katz which established a two-part test for determining when a “search” occurred, as “the Katz analysis”). 185 Minnesota v. Carter, 525 U.S. 83, 97 (1998) (Scalia, J., concurring) (commenting on “the Katz test (which has come to mean the test enunciated by Justice Harlan's separate concurrence in Katz)”). 186 401 U.S. 745 (1971). 187 Justice White distinguished Katz by explaining that: Katz involved no revelation to the Government by a party to conversations with the defendant nor did the Court indicate in any way that a defendant has a justifiable and constitutionally protected expectation that person with whom he is conversing will not then or later reveal the conversation to the police.” White, 401 U.S. at 749 (plurality opinion). 188 Id. at 776-80 (Harlan, J., dissenting). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 89 Specifically, Justice Harlan noted that Berger “expressed concern about scientific developments that have put within the reach of the Government the private communication of `anyone in almost any given situation,' [and] it left no doubt that, as a general principle, electronic eavesdropping was an invasion of privacy and that the Fourth Amendment prohibited unsupervised `bugging.'”189 In Justice Harlan's view, Katz was simply the concluding chapter of the Court's new edition on the meaning of the Fourth Amendment. Justices White and Harlan not only proffered different views on Katz's specific holding, they also differed on Katz's impact on Fourth Amendment theory. For Justice White, Katz's impact was limited to overruling the trespass rule. Katz did not affect the assumption of risk theory of prior cases, nor did it represent a shift in judicial analysis in determining the Fourth Amendment's reach. 190 Justice Harlan, on the other hand, questioned the compatibility of “risk analysis” and “expectations” theory with the Court's contemporary approach to defining the Fourth Amendment's reach. Although his opinions in Lopez and Katz were crucial to the development of each of these legal theories, Justice Harlan now believed that risk analysis and expectations theory was neither consistent with the holding of Katz nor compatible with the central purpose of the Amendment. 191 Justice Harlan's comments seem to recognize that the analysis o f K a t z— r e l y i n g a s i t d o e s o n t h e i n d i v i d u a l ' s expectations—was an inadequate model for defining the Fourth Amendment's reach in an age of technological innovation. For Harlan, merely describing the risks a person assumes or subjective expectations he holds was a flawed model for identifying the Fourth Amendment's reach. The “critical question” was whether the Court “should impose on 189 Id. at 779 (Harlan, J., dissenting) (quoting Berger v. New York, 388 U.S. 41, 47 (1967)). 190 Justice White saw no constitutional difference between wired and unwired spies. Given the possibility or probability that one of his colleagues is cooperating with the police, it is only speculation to assert that the defendant's utterances would be substantially different or his sense of security any less if he also thought it possible that the suspected colleague is wired for sound. White, 401 U.S. at 752 (plurality opinion). According to Justice White, government use of wired and unwired informants “is ruled by fluid concepts of `reasonableness.'” Id. at 753 (plurality opinion). 191 See id. at 786 (Harlan, J., dissenting). 89 FILE:C:\WP51\72-1\MACLIN.DTP 90 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 our citizens the risks of the electronic listener or observer without at least the protection of a warrant requirement.”192 Unlike Justice White, who thought that a traditional “reasonableness” model was capable of assessing the constitutionality of electronic surveillance, Justice Harlan appeared to be saying that the Court must go further than simply asking what constitutes reasonable police conduct. Instead, the Justices must examine “the realm of values protected by the Fourth Amendment.”193 A second illustration of the Court's internal discord over the meaning of Katz occurred in the term following Katz. In Desist v. United States,194 the Court had to decide whether Katz's holding should be given retrospective application. When Desist was decided, one of the criteria for determining whether a new constitutional ruling would be given retroactive affect focused on “the extent of the reliance by law enforcement authorities on the old standards.”195 With this concern in mind, the defendants in Desist argued that Katz “merely confirmed the previous demise of obsolete decisions enunciating the distinction between `trespassory' searches and those in which there was no physical penetration of the protected premises.”196 The Desist Court, however, concluded that this argument “misconstrues our opinion in Katz.”197 According to Justice Stewart, the author of Desist, on the day the Court decided Katz, “the assumption persisted that electronic surveillance did not offend the Constitution unless there was an `actual intrusion into a constitutionally protected area.'” 198 Justice Stewart conceded that decisions which preceded K a t z “ m a y h a v e r e f l e c t e d g r o w i n g dissatisfaction with the traditional tests of the constitutional 192 Id. Id. at 778; see also id. at 786-87 (arguing that the Court must assess “the nature of a particular [police] practice and the likely extent of its impact on the individual's sense of security balanced against the utility of the conduct as a technique of law enforcement. For those more extensive intrusions that significantly jeopardize the sense of security which is the paramount concern of Fourth Amendment liberties, I am of the view that more than self-restraint by law enforcement officials is required and at the least warrants should be necessary.”) (citations omitted). 194 394 U.S. 244 (1969). 195 Desist, 394 U.S. at 249 (quoting Stovall v. Denno, 388 U.S. 293, 297 (1967)). The other two criteria were: “the purpose to be served by the new standards” and “the effect on the administration of justice of a retroactive application of the new standards.” Id. The legal standards for retroactive application of Supreme Court precedents have changed since Desist was decided. See KAMISAR ET AL, supra note 18, at 41-47. 196 Desist, 394 U.S. at 247 (citations omitted). 197 Id. 198 Id. at 248. 193 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 91 validity of electronic surveillance,” but he noted that the Court had never overruled those tests. 199 Thus, while the result in Katz “may have been foreshadowed, it was a clear break with the past.”200 Accordingly, Desist ruled that Katz would have only prospective application. This understanding of Katz baffled Justice Fortas, who had joined Justice Stewart's majority opinion in Katz itself. Justice Fortas was certain that the trespass rule was dead long before the Katz decision.201 But another aspect of the Court's failure to apply Katz retrospectively troubled Justice Fortas. He noted that the “vitality of our Constitution depends upon conceptual faithfulness and not merely decisional obedience” that law enforcement officials and lower courts afford to the Court's precedents. 202 By giving Katz only prospective application, the Desist Court sent two related messages to police officials and lower court judges. One message encouraged police officials “who honor the Constitution's mandate only where acceptable to them or compelled by the precise and inescapable specifics of a decision of this Court.”203 The second message that Desist sent was more pointed. Prospective application of Katz awarded dunce caps to those law enforcement officers, courts, and public officials who do not merely stand by until an inevitable decree issues from this Court, specifically articulating that which is clearly immanent in the fulfillment of the Constitution, but who generously apply the mandates of the Constitution as the developing case law elucidates them.204 Justice Fortas's comments on the importance of “conceptual faithfulness” to Supreme Court precedents help to identify a basic problem with Katz. Justice Fortas's dissent in Desist was a veiled criticism of law enforcement officers and judges who took a narrow view of the Court's pre-Katz Id. Id. 201 Using somewhat colorful language, Justice Fortas stated: Katz is not responsible for killing Olmstead. Prior cases had left the physical-trespass requirement of Olmstead virtually lifeless and merely awaiting the death certificate that Katz gave it. They demonstrated to all who were willing to receive the message that Olmstead would not shield eavesdropping because it took place outside the physical property line. Desist, 394 U.S. at 275 (Fortas, J., dissenting) (citations omitted). 202 Id. at 277. 203 Id. 204 Id. 199 200 91 FILE:C:\WP51\72-1\MACLIN.DTP 92 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 cases. Some of the conservative Justices of the Burger and Rehnquist Courts have encountered similar criticism for their application of Katz.205 But before police officers, lower court judges, and even Supreme Court Justices can be expected to honor the “conceptual faithfulness” of a Court ruling, they h ave to know what that ruling requires of them. The problem with Katz is that it was so lacking in substance and subject to judicial manipulation that it could mean anything to anyone. The debate between Justices White and Harlan in White and Justices Stewart and Fortas in Desist illustrate the problem that occurs when the Justices who decide a “landmark” case like Katz disagree among themselves. For example, when the Justices cannot agree whether a case fundamentally altered the “rules of the game” regarding the constitutionality of electronic surveillance,206 that case is an unlikely protector of civil liberties in future cases involving technological and scientific innovations that threaten Fourth Amendment rights. Similarly, if within a year's time, the Justices who announce a ruling that many legal scholars characterize as a revolutionary alteration of the protection provided by the Fourth Amendment are deeply divided over whether that ruling “was a clear break with the past,” then that ruling should not be expected to generate consensus among future Justices regarding its meaning in other constitutional contexts. Despite the apparent consensus among the Justices when they decided Katz, it soon became obvious that the same Justices who participated in the Katz 205 See, e.g., Minnesota v. Carter, 525 U.S. 83, 110-11 (1998) (Ginsburg, J., dissenting) (“The Court's decision in this case veers sharply from the path marked in Katz.”); Florida v. Riley, 488 U.S. 445, 456 (1989) (Brennan, J., dissenting) (“The opinion for a plurality of the Court reads almost as if [Katz] had never been decided.”); id. at 457 (plurality's position that helicopter surveillance of a backyard is not a search “ignores the very essence of Katz”); California v. Ciraolo, 476 U.S. 207, 216 (1985) (Powell, J., dissenting) (asserting that the Court “departs significantly from the standard developed in Katz”); Oliver v. United States, 466 U.S. 170, 188 (1984) (Marshall, J., dissenting) (“The Court's contention that, because a field is not a house or effect, it is not covered by the Fourth Amendment is inconsistent with th[e] [Katz] line of cases and with the understanding of the nature of constitutional adjudication from which it derives.”) (footnote omitted). 206 Compare United States v. White, 401 U.S. 745, 750 (1971) (plurality opinion of White, J.) (“We see no indication in Katz that the Court meant to disturb [the “risk analysis” theory] or to disturb the result reached in the On Lee case, nor are we now inclined to overturn this view of the Fourth Amendment.”) (footnote omitted), with White, 401 U.S. at 780 (opinion of Harlan, J., dissenting) (stating that Katz “added no new dimension to the law. At most it was a formal dispatch of Olmstead and the notion that such problems may usefully be resolved in the light of trespass doctrine, and, of course, it freed from speculation what was already evident, that On Lee was completely open to question.”). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY decision could not agree on fundamental ruling. When this lack of consensus over the is combined with the emptiness of the legal announced, it is not surprising to find that poor guardian of Fourth Amendment rights. 93 aspects of that meaning of Katz norms that Katz Katz has been a III. WHAT IMPACT WILL KYLLO HAVE? A. Kyllo's Impact on Earlier Cases Limiting the Scope of the Fourth Amendment The above discussion described the similarities of Katz and Kyllo, and argued that Katz has been a weak protector of Fourth Amendment rights. Kyllo's impact on search and seizure interests, of course, is uncertain at this point. I suspect, however, that Kyllo, like Katz, is unlikely to prevent the use of technology to monitor and reveal information helpful to law enforcement officials. One reason why Kyllo's impact may be blunted is because the Court may be unwilling to follow the implications of Kyllo's holding in future cases. Consider, for example, a couple of precedents that seem undermined by Kyllo's logic. When explaining why thermal imaging constituted a search, Justice Scalia seemed annoyed with Justice Stevens's numerous statements that thermal imaging did not reveal information regarding the interior of the home. In Scalia's view, “a thermal imager reveals the relative heat of various rooms in the home.”207 Although that information was not “particularly private or important,” there was no basis for concluding it is not “information regarding the interior of the home.”208 Justice Scalia also curtly dismissed Justice Stevens's comparison of thermal imagining to what a passerby might be able to observe by using ordinary human senses. 209 Justice Scalia noted that the dissent's comparison was “quite 207 Kyllo v. United States, 533 U.S. 27, 35, n.2 (2001). Kyllo, 533 U.S. at 35 n.2. 209 According to Justice Stevens, “any member of the public might notice that one part of a house is warmer than another part or a nearby building if, for example, rainwater evaporates or snow melts at different rates across its surfaces.” Id. at 43 (Stevens, J., dissenting). Justice Stevens's logic is reminiscent of Chief Justice Burger's analysis in Ciraolo. In Ciraolo, Chief Justice Burger concluded that police use of an airplane to observe the defendant's backyard curtilage was not a search because “[a]ny member of the public flying in this airspace who glanced down could have seen everything that these officers observed.” Ciraolo v. California, 476 U.S. 207, 213-14 (1985). 208 93 FILE:C:\WP51\72-1\MACLIN.DTP 94 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 irrelevant” because “[t]he fact that equivalent information could sometimes be obtained by other means does not make lawful the use of means that violate the Fourth Amendment.”210 Justice Scalia's conclusion that thermal imaging is a search is more convincing than Justice Stevens's contrary judgment. But if Justice Scalia is correct to say that thermal imaging is a search because it reveals information regarding the interior of the home, why isn't a police pen register—which also reveals information regarding the interior of a home, to wit: the telephone numbers dialed-a search? As noted earlier, Smith v. Maryland held that a pen register was not a search.211 One might try to distinguish Smith by arguing that a pen register does not involve a police intrusion into the home, but a thermal imager does not invade the home either. Both the government and Justice Stevens emphasized that because a thermal imager only detects heat that radiates from the external surface of a home, it did not trigger Fourth Amendment protection, a point that Justice Scalia did not contest. 212 Alternatively, one might try to distinguish Smith by arguing that a homeowner assumes the risk that the police would learn the numbers he dialed from his home because those numbers were revealed to the telephone company, which, in turn, was free to provide the numbers to the police. Although the Smith Court accepted that rationale, it is not a 210 Kyllo, 533 U.S. at 35, n.2. Interestingly, Justice Scalia's rebuttal to Justice Stevens's argument sounded more like Anthony Amsterdam than Warren Burger. In his seminal article on the Fourth Amendment, Professor Amsterdam explained why the availability of information from unofficial sources does not give the government carte blanche to utilize police methods to obtain that same information. See Amsterdam, supra note 23 at 406-07 (“Every person who parks his or her car on a side street in Greenwich Village voluntarily runs the risk that it will be burglarized—a risk, I should add as one who has lived in Greenwich Village, that is very much higher than the risk of betrayal by your friends even if you happen to choose your friends exclusively from a circle of Machiavellian monsters. Does that mean that government agents can break into your parked car uncontrolled by the fourth amendment? Or pay the junkies to break into it?”). 211 Smith v. Maryland, 442 U.S. 735, 741 (1979). 212 See Kyllo, 533 U.S. at 41 (noting that the police observations “were made with a fairly primitive thermal imager that gathered data exposed on the outside of petitioner's home but did not invade any constitutionally protected interest in privacy”) (Stevens, J., dissenting) (footnote omitted); id. at 44 (“equipment in this case did not penetrate the walls of petitioner's home, and while it did pick up `details of the home' that were exposed to the public, it did not obtain `any information regarding the interior of the home.'”); Brief for the United States at 19, Kyllo (No. 99-8508) (“the imager did not literally or figuratively penetrate the walls of petitioner's house and perceive private activities inside”); id. at 26 (stating that the thermal imager detected “only heat radiating from the external surface of the house”). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 95 convincing legal theory to measure the scope of the Fourth Amendment. 213 But even if one is persuaded by risk theory, that logic is equally applicable to Danny Kyllo's case. Indeed, the court of appeals, the Solicitor General's office, and Justice Stevens all endorsed the notion that Kyllo assumed the risk that someone located outside might detect the heat emanating from his home.214 According to Justice Stevens, society is unlikely to suffer from “a rule requiring the rare homeowner who both intends to engage in uncommon activities that produce extraordinary amounts of heat, and wishes to conceal that production from outsiders, to make sure that the surrounding area is well insulated.”215 Moreover there are additional similarities between a thermal imager and a pen register. In Kyllo, Justice Scalia explained that a search occurs whenever police use “sense- 213 See e.g., United States v. White, 401 U.S. 745, 786 (1971) (Harlan, J., dissenting) (noting that the “risk analysis” model of prior cases “lead to the substitution of words for analysis. The analysis must, in my view, transcend the search for subjective expectations or legal attribution of assumptions of risk. Our expectations, and the risks we assume, are in large part reflections of laws that translate into rules the customs and values of the past and present.”); Slobogin, supra note 28, at 1417 (noting that assumption of risk theory is “vacuous” in Kyllo: “The most pertinent illustration of that fact is that until the Supreme Court decision in Kyllo, in most jurisdictions we `assumed the risk' that police subject the interior of our houses to thermal imaging without obtaining a warrant or developing any level of suspicion that evidence of a crime would be discovered.”); cf. Amsterdam, supra note 23, at 470, n.492 (“The question is whether the [F]ourth [A]mendment regulates the activity of the police in dispatching spies to insinuate themselves into people's confidences and homes . . . . If it does not, then the government may unleash its spies on any of us, criminals or not; and talk about `criminals' assuming the risks means that we all assume the risks.”); Baldwin v. United States 450 U.S. 1045 (1981) (Marshall, J., dissenting). In Baldwin, the Court denied certiorari to review the claim that a search occurred when an undercover agent, who had obtained a position as the defendant's handyman and chauffeur, obtained samples of cocaine from the defendant's home. Baldwin, 405 U.S. at 1045. Justice Marshall complained that under the logic of the lower court, “the Government need never satisfy the probable-cause and warrant requirements of the Fourth Amendment if, by disguising its officers as repairmen, babysitters, neighbors, maids, and the like, it is able to gain entry into an individual's home by ruse rather than force in order to conduct a search.” Id. at 1049 (Marshall, J., dissenting) (footnote omitted). 214 See United States v. Kyllo, 190 F. 3d 1041, 1046 (9th Cir. 1998) (explaining that Kyllo “took no affirmative action to conceal the waste heat emissions created by the heat lamps needed for a success indoor grow”); Brief for United States at 25, Kyllo (No. 99-8508) (“When a government investigator is in a public place and uses technology to observe an area exposed to the public; it does not constitute a search, provided that technology does not directly detect private activity (or other private details) occurring in a private area.”); Kyllo, 533 U.S. at 45 (Stevens, J., dissenting). 215 Kyllo, 533 U.S. at 45 (Stevens, J., dissenting). 95 FILE:C:\WP51\72-1\MACLIN.DTP 96 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 enhancing technology [to obtain] any information regarding the interior of the home that could not otherwise have been obtained without physical `intrusion into a constitutionally protected area.'”216 Under this standard, a pen register is also a search because it is technology that enables the police to obtain information regarding the interior of the home that could not otherwise have been obtained without physical intrusion into the home. The pen register reveals the numbers dialed on a home telephone that would otherwise be unavailable unless officers were inside the home to observe the dialing. 217 Furthermore, a pen register is not a device generally used by the public.218 And finally, the pen register reveals details about the home. Indeed, a pen register provides more revealing and intimate details about the home than a thermal imager. While a thermal imager measures relative amounts of heat that may be escaping the home, a pen register identifies the people and organizations called by a h omeowner, and thus reveals “the most intimate details of a person's life.”219 In sum, the legal analysis that dictates the conclusion that thermal imaging is a search also compels the conclusion that a pen register is a search. Despite the parallels between a thermal imager and a pen register, Justice Scalia made no effort to reconcile Kyllo's holding with Smith v. Maryland. 220 This is not to suggest that the Justices comprising the Kyllo majority are ready to reconsider or overrule Smith. If forced to revisit the constitutionality of pen registers, it is highly 216 Id. at 34 (citation omitted). Of course, one might argue that because the police could subpoena a person's telephone records and obtain information about the numbers dialed within a home, the Fourth Amendment does not bar the police from obtaining that same information pursuant to a pen register. Under Kyllo's analysis, however, a pen register does not become a non-search simply because the information revealed by the pen register is available from other sources. Id. at 35, n.2 (“The fact that equivalent information could sometimes be obtained by other means does not make lawful the use of means that violate the Fourth Amendment.”). 218 See Carrie L. Groskopf, If It Ain't Broke, Don't Fix It: The Supreme Court's Unnecessary Departure From Precedent in Kyllo v. United States, 52 DEP AUL L. REV. 201, 243 (2002) (“A pen register, in fact, is a device geared specifically for law enforcement purposes, and not for individual use. It would seem then, that under the reasoning of Kyllo, because a pen register is arguably not considered to be commonly available to the general public, the employment of a pen register should be unconstitutional.”) (footnote omitted). 219 Smith v. Maryland, 442 U.S. 735, 748 (1979) (Stewart, J., dissenting). 220 While Justice Scalia did not attempt to reconcile his logic with Smith's holding, Justice Stevens argued that technological equipment that disclosed “only the relative volume of sound leaving [a telephone] booth, which presumably was discernible in the public domain,” would be constitutional under Smith's holding. Kyllo, 533 U.S. at 49-50, n.6 (Stevens, J., dissenting). 217 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 97 likely that the current Court would reaffirm Smith's holding notwithstanding the result in Kyllo. That said, Justice Scalia's silence regarding Smith is worth mentioning. Notwithstanding the shared traits between a thermal imager and a pen register, Justice Scalia's analysis in Kyllo proceeds forward oblivious to the tension between Kyllo's holding that thermal imaging is a search and Smith's ruling that a pen register is not a search. Conceivably, Justice Scalia did not notice the tension between Kyllo's holding and Smith's holding, although that is an unlikely scenario since a number of law professors immediately recognized the tension. 221 Perhaps, Justice Scalia's silence was compelled by the need to maintain the vote of one or more members of the Kyllo majority who were unwilling to join an opinion that cast doubt on the result in Smith. Whatever the explanation, at some point in the future, the Court may be forced to address the conflict between Kyllo and Smith. When that happens, my prediction is that the Court will confine Kyllo's reasoning to its special facts, reaffirm Smith's holding, and find that the Fourth Amendment presents no obstacles to using technology that is the functional equivalent of a pen register.222 Another precedent that Kyllo's reasoning undermines is 221 See e.g., Joshua Dressler, posting on Jan. 17, 2002 (copy on file with author) (“Of course, after Kyllo last year, one can seriously question whether Smith v. Maryland can be justified on any reasonable basis of principle. If a thermal imager used outside a house to detect heat levels inside a house is unconstitutional (in the absence of a warrant), one wonders why the rule should be different in the case of a pen register obtaining phone calling activities inside.”). But cf. Norman M. Garland, posting on Jan. 17, 2002 (copy on file with author) (“I think that [Kyllo] reaffirms the validity of the Smith case. Scalia, for the majority, cites Smith to distinguish it from the case before it.”). I think that Professor Garland places too much weight on Justice Scalia's citation of Smith. Justice Scalia's sole reference to Smith occurs in Part II of his opinion which describes the law concerning police activities that trigger Fourth Amendment protection. As Professor Garland notes, Justice Scalia states that the Katz test has been applied “in holding that it is not a search for the police to use a pen register at the phone company to determine what numbers were dialed in a private home, Smith v. Maryland, 442 U.S. 735, 743-744 (1979).” Kyllo, 533 U.S. at 33. Scalia then explains that Kyllo “involves officers on a public street engaged in more than naked-eye surveillance of a home,” and comments that the Court has “previously reserved judgment as to how much technological enhancement of ordinary perception from such a vantage point, if any, is too much.” Id. Justice Scalia's standard of review is announced in Part III of his opinion. See Id. at 34. After announcing that standard, Justice Scalia never compares or contrasts the holding in Smith with the standard established in Kyllo. Thus, rather than distinguish Smith's holding from the rule announced in Kyllo, Justice Scalia is, at best, indifferent to Smith, and makes no effort to reconcile his own reasoning with Smith's analysis and holding. 222 See infra notes 343-59 and accompanying text. 97 FILE:C:\WP51\72-1\MACLIN.DTP 98 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 United States v. Place.223 Place permitted police use of another type of technology—albeit canine technology—that has impacted Fourth Amendment rights. 224 Place held that a canine sniff of luggage that discloses only the presence or absence of narcotics is not a search.225 In his Kyllo dissent, Justice Stevens complained that the Court's ru le would cover devices that are designed to detect emissions coming from a house.226 Justice Stevens sensibly noted Place's holding would authorize “sense-enhancing equipment that identifies nothing but illegal activity.” 227 According to Justice Stevens, Place's holding has been diluted because use of a mechanical dog or other type of technology directed at home that might detect “the odor of deadly bacteria or chemicals for making a new type of high explosive” would be illegal under Kyllo's reasoning.228 Interestingly, Justice Scalia chose not to respond to Justice Stevens's comments on the future viability of Place's holding concerning technological devices that provide information regarding the interior of a home. Justice Scalia's silence on this point is even more perplexing than his refusal to discuss Kyllo's impact on Smith's holding for two reasons. First, the conflict between Kyllo and extending Place's holding to cover technological devices that reveal information about the inside of a home is even more striking than the tension between Kyllo and Smith. A dog sniff, whether mechanical or not, that detects the odor of contraband or deadly bacteria coming from a home is easily covered by Kyllo's rule that a search occurs whenever “sense-enhancing technology [enables the police to obtain] any information regarding the interior of [a] home that could not otherwise have been obtained without physical `intrusion into [the home].'”229 Second, when Kyllo was under review by the Court, an influential federal court of appeals had already ruled that 462 U.S. 696 (1983). Place, 462 U.S. at 707. Id. In a rather casual manner, and without prompting a dissent, Place's holding was extended to automobiles in Indianapolis v. Edmond, 531 U.S. 32, 40 (2000). Edmond ruled that a narcotics vehicle checkpoint was an unreasonable seizure because its primary purpose was law enforcement related. Edmond, 531 U.S. at 48. As it did in Place, the Edmond Court reached out to decide the constitutionality of a narcotics dog sniff of an automobile, even though that issue was unrelated to the central issue before the Court. Id. at 40. Speaking for the majority, Justice O'Connor, relying exclusively on Place, ruled that a canine sniff of a car is not a search. Id. 226 Kyllo, 533 U.S. at 47 (Stevens, J., dissenting). 227 Id. 228 Id. at 48. 229 Id. at 34. 223 224 225 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 99 Place's holding should not be extended to private homes. 230 It would be surprising that the Court was unaware of this development when deciding Kyllo.231 Moreover, several lower court judges have acknowledged the conflict between Kyllo and Place.232 Although the lower courts have reached different results on the constitutionality of canine sniffs in various contexts, several judges have commented that Kyllo “appears to run counter to the analytical basis of the `dog sniff' rule.”233 My emphasis on the tension between Kyllo and Place is not to predict that the Kyllo majority is poised to overrule or reconsider Place. Indeed, during the same Term that Kyllo was decided, the Court unanimously held in Indianapolis v. Edmond234 that a dog sniff of an automobile was not a search, and cited Place as the controlling precedent. Of course, under the Court's precedents, cars and containers found therein are not entitled to the same privacy interests that are afforded to homes, 235 but luggage is normally entitled to more privacy than cars, 236 unless, of course, the luggage is found inside an automobile.237 United States v. Thomas, 757 F.2d 1359 (2d Cir. 1985). Professor LaFave's treatise gives prominent attention to Thomas. See L AF AVE, supra note 21, § 2.2(f) at 459. LaFave also highlights that the validity of Thomas's legal analysis was questioned in United States v. Colyer, 878 F.2d 469 (D.C. Cir. 1989), which ruled that a dog sniff of a roomette in a train was not a search. See L AF AVE, supra note 21, § 2.2(f) at 460. 232 See, e.g. United States v. Richard, No. CRIM 01-20048-01, 2001 WL 1033421, at *6 n.4 (W.D. La., 2001); State v. Wiegand, 645 N.W. 2d 125, 130 (Minn. 2002); People v. Haley, 41 P.3d 666, 671 n.2 (Colo. 2001); State v. Bergmann, 633 N.W.2d 328, 334 (Iowa 2001); State v. Miller, 647 N.W.2d 348, 355 n.2 (Wis. App. 2002) (Dykman, J. concurring). 233 Richard, 2001 WL 1033421, at *6 n.4. See also Wiegand, 645 N.W.2d at 138 (Page, J., concurring) (“I do not see a distinction between senseenhancement-by-technology and sense-enhancement-by canine.”); Haley, 41 P.3d at 671 n.2 (“In our view, the logic of [Kyllo's] holding undercuts the prosecution's argument that dog sniffs of the outside of an automobile to detect the contents thereof do not fall within a reasonable expectation of privacy.”). 234 531 U.S. 32, 40 (2000). 235 See California v. Carney, 471 U.S. 386 (1985). Chief Justice Burger's opinion in Carney held that the “automobile exception”—which permits warrantless searches of cars provided there is probable cause—controlled the search of a motor-home that was found in a public parking lot. Carney, 471 U.S. at 390-94. 236 See United States v. Chadwick, 433 U.S. 1 (1977). Chadwick held that a warrantless search of a footlocker was unconstitutional, even though there was probable cause to believe it contained contraband. Chadwick, 433 U.S. at 15-16. In an opinion by Chief Justice Burger, the Court pointedly rejected the government's argument that the automobile exception should equally apply to movable containers, and that the warrant requirement should be confined to searches of homes and other areas of “core” privacy interests. Id. at 11-13. 237 A description of the intricacies and absurdities of the Court's automobile 230 231 99 FILE:C:\WP51\72-1\MACLIN.DTP 100 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 My point is not to predict the demise of Place. Rather, my contention is that Kyllo undercuts the argument that a dog sniff of an apartment or a roomette on a train is not a search under the Fourth Amendment. Like a thermal imager, a canine sniff is a law enforcement device that allows the police to obtain information regarding the interior of a home or other protected area that could not otherwise have been obtained without a physical intrusion.238 Of course, dogs, more so than pen registers, electronic beepers and airplanes are generally available to the public,239 which may make Kyllo's reasoning inapplicable to canine sniffs. 240 As others have search doctrine is beyond the scope of this article. Cases such as Wyoming v. Houghton, 526 U.S. 295 (1999), California v. Acevedo, 500 U.S. 565 (1991), and United States v. Ross, 456 U.S. 798 (1982) are examples of the Court's most recent pronouncements in this area. 238 Cf. Thomas K. Clancy, Coping with Technological Change: Kyllo and the Proper Analytical Structure to Measure The Scope of Fourth Amendment Rights, 72 MISS. L.J. 525, 557 (2002) (asserting that the “logic of [Kyllo's] analysis surely must apply to all technological devices that detect information about the interior of the home”). At least one lower court has intimated that Kyllo does not affect canine sniffs because a dog sniff is not “technology” within the meaning of the Kyllo's holding. See Wiegand, 645 N.W.2d at 130 n.3. In Wiegand, the Minnesota Supreme Court distinguished the facts involved there, namely, a dog sniff of a car, by stating: “We are not faced with the issue of a dog sniff around a home, nor are we faced with an investigative technique involving a piece of technology with the potential for dramatic technological advancements.” Id.; see also Haley, 41 P.3d at 677-78 (Kourlis, J., dissenting) (rejecting the majority's argument that Kyllo undermines Place's logic: “A dog sniff is not a technological advancement that invites the same sort of concern [present in Kyllo].). That conclusion misses the point of Kyllo. Justice Scalia specifically noted that the Court had “reserved judgment as to how much technological enhancement of ordinary perception from [a public] vantage point, if any, is too much.” Kyllo v. United States, 533 U.S. 27, 33 (2001). Canine sniffs undoubtedly enhance the ordinary sensory faculties of police officers. In fact, police “use of a dog is not a mere improvement of their sense of smell, as ordinary eye glasses improve vision, but is a significant enhancement accomplished by a different, and far superior, sensory instrument.” United States v. Thomas, 757 F.2d 1359, 1367 (2d Cir. 1985). While it is imaginable that a police officer, using her ordinary senses, might be able to discern the same information that a thermal imager reveals, see Kyllo, 533 U.S. at 43 (Stevens, J., dissenting) (“[T]he ordinary use of the senses might enable a neighbor or passerby to notice the heat emanating from a building, particularly if it is vented, as was the case here.”), the dog sniff does what no ordinary person can do. See Harris, supra note 119, at 24 n.137 (“Although both man and dog can smell, the dog's nose was not simply a way to enhance what the human at the end of the leash could do. Rather, the canine nose is so much better—more sensitive and more accurate—than its human counterpart that it simply could not be said to replace it.”). 239 At least one state supreme court justice, however, has stated that a contraband sniffing dog should not be considered technology in general public use. See Wiegand, 645 N.W.2d at 138 (Page, J., concurring specially) (“In this case, the sense-enhancing dog sniff, not in general public use, obtained information regarding the interior of the vehicle. . . . ”) (emphasis added). 240 Whether the “general public use” rule is part of Kyllo's holding is uncertain. “It is worth noting that the Kyllo majority never firmly adopted the general public use doctrine. In a footnote, it stated that general public use `may' be a factor in the search analysis, and intimated it might `reexamine' this factor FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 101 already noted, however, whether a particular device is in general public use should have no impact on Fourth Amendment analysis. 241 House burglars are prevalent too, but because I run the risk that my home may be burglarized does not mean that a warrantless police invasion of my house is not a search. Likewise, if technology gives the government access that is the functional equivalent of physical presence in my home, the general availability of that technology should not make a differen ce when deciding whether the government's use of that technology constitutes a search. A dog sniff is a search because it provides the functional equivalent of actual presence in the area being targeted. Sooner or later, the Court will have the opportunity to address the conflict between Kyllo and Place. When that occasion arises, my prediction is the Court will give Kyllo a narrow reading and extend Place's holding to authorize dog sniffs of private residences. 242 If my guess is correct, a major in the future.” Slobogin, supra note 28, at 1432 n.179 (citing Kyllo, 533 U.S. at 39 n.6). 241 Justice Stevens correctly asserted that a “general public use” rule is “perverse because it seems likely that the threat to privacy will grow, rather than recede, as the use of intrusive equipment become more readily available.” Kyllo, 533 U.S. at 47 (Stevens, J., dissenting). For a compelling critique of the “general public use” factor apparently established in Kyllo, see Slobogin, supra note 28. In a pre-Kyllo article, Professor David Harris also pointed out the flaws in having the scope of the Fourth Amendment turn on what technology is generally available to the public. Harris, supra note 119, at 23 (noting that the “type of technology the public can possess may change with surprising speed. Worse, the Court's reasoning implies that citizens somehow assume the risk of being observed by whatever technology the government can muster for its crime-fighting efforts.”). 242 The Court will probably distinguish Kyllo in this context by explaining that a dog sniff only detects “the presence or absence of narcotics, a contraband item. Thus, despite the fact that the sniff tells the authorities something about the contents of the [home], the information obtained is limited.” Place, 462 U.S. at 707. In contrast, the information disclosed by a thermal imager is not limited to detecting contraband. A recent lower court holding supports my prediction. See Porter v. Texas, No. 14-01-0177-CR to 14-01-0179-CR, 2002 WL 31008148 (Tex. App. Sept. 5, 2002). Porter held that a dog sniff of a home is not a search. Porter, 2002 WL 31008148 at *3. The Porter court explained that a dog sniff only discloses whether or not contraband is present and that a person does not have a legitimate expectation of privacy in possessing contraband. Id. See also, George M. Dery III, The Loss of Privacy Is Just a Heartbeat Away: An Exploration of Government Heartbeat Detection Technology and Its Impact on Fourth Amendment Protections, 7 WM . & MARY BILL RTS. J. 401, 412-13 (1999) (noting that the rule emerging from Place and Jacobsen is that if officials utilize devices that are “so precise as to identify nothing but illegally-possessed items, then the surveillance did not constitute a search”); Simmons, supra note 120, at 1352, n.208 (“[S]ince the Court in Jacobsen essentially held that there is no legitimate privacy interest in possessing illegal substances, the Court could easily 101 FILE:C:\WP51\72-1\MACLIN.DTP 102 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 element of Kyllo's framework will be diluted and the Court will have, literally and figuratively, “opened the doors” of people's homes to various types of technological devices that can selectively identify emissions coming from a home.243 In sum, Kyllo's impact on future Fourth Amendment doctrine may be limited because Justice Scalia's opinion conflicts with key aspects of search and seizure law that currently permit technological and other sense-enhancing instruments to be used to gather information about “the most intimate details of a person's life.”244 Unless the Court is prepared to overrule (or severely limit) cases like Smith v. Maryland and United States v. Place (and there is no hint in Kyllo that the Court is ready to do this), the “right” announced in Kyllo will most likely be confined to a privilege against the use of a thermal imager directed at one's home.245 harmonize the Kyllo test with the Place doctrine by confirming that Kyllo only applies to areas, activities and items in which an individual has a legitimate expectation of privacy. The specific language used in Kyllo already implies this, since it limits the test to `details of the home,' which clearly deserve constitutional protection.”); cf. Michael Adler, Cyberspace, General Searches, and Digital Contraband: The Fourth Amendment and the Net-Wide Search, 105 YALE L. J. 1093, 1098 (1996) (considering the Fourth Amendment implications of a “perfect search”—a computer program that would scan a hard drive and “report only the presence or absence of an exact copy of a certain piece of illegal modified software,” and would “ignore everything else on the disk, no matter how blatantly illegal—or sensationally intriguing—a human investigator might find that information.”). 243 Cf. Kyllo, 533 U.S. at 45 (Stevens, J., dissenting) (“[P]ublic officials should not have to avert their senses or their equipment from detecting emissions in the public domain such as excessive heat, traces of smoke, suspicious odors, odorless gases, airborne particulates, or radioactive emissions, any of which could identify hazards to the community.”). 244 Smith v. Maryland, 442 U.S. 735, 748 (1979) (Stewart, J., dissenting). 245 A few lower courts have already hinted that Kyllo's holding does not extend to the use of a thermal imager to scan premises other than the home, such as commercial premises. See United States v. Elkins, 300 F.3d 638, 646 (6th Cir. 2002) (“While Kyllo broadly protects homes against warrantless thermal imaging, the case before us involves the use of a thermal image to scan the Elkinses' commercial buildings.”) (emphasis added); State v. Mordowanec, 788 A.2d 54 (Conn. 2002) (“The Kyllo decision did not address the question of whether a search warrant would be required to conduct a thermal imaging scan of premises other than a home, such as a commercial property. The court emphasized, however, the heightened expectation of privacy in one's home and distinguished that heightened expectation from the lesser expectation of privacy in a commercial property.”). Although these cases did not resolve the constitutional issue at stake, they surely indicate a reluctance to extend Kyllo's reach beyond a private home. FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY B. Kyllo and Bright-Line Rules 103 103 FILE:C:\WP51\72-1\MACLIN.DTP 104 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 The second reason to question Kyllo's impact on future cases focuses not on technology or scientific innovation, but on old-fashion Fourth Amendment doctrine. As noted earlier, Justice Scalia's opinion stressed the importance of bright-line rules, which provide guidance to police officers and judges who must follow and apply the Court's search and seizure doctrine. According to Justice Scalia, a clear constitutional rule was vital in Kyllo because “the Fourth Amendment draws `a firm line at the entrance to the house.' That line, we think, must be not only firm but also bright—which requires clear specification of those methods of surveillance that require a warrant.”246 Justice Stevens' dissent ridiculed the quality and clarity of Justice Scalia's per se rule, describing it as both “far too broad” and “too narrow,” depending on the context. 247 To the surprise of many Court-watchers, Justice Stevens preferred giving politicians “an unimpeded opportunity” to resolve future developments concerning technology and Fourth Amendment rights, “rather than to shackle them with prematurely devised constitutional restraints.”248 The important point here is not deciding who makes the better argument on the need for bright-line rules in the context of thermal imaging, but rather that Justice Scalia's conclusion on the need for per se rules is not likely to change or effect future Fourth Amendment doctrine, no matter how persuasive his arguments may hav e been in Kyllo. The Court's zigzag approach on the appropriateness of bright-lines in search and seizure cases is notorious. 249 There is no neutral Kyllo, 533 U.S. at 40 (citation omitted). As noted above, see supra notes 226-28 and accompanying text, Justice Stevens asserted that Kyllo's rule was too broad because it would “embrace potential mechanical substitutes for dogs trained to react when they sniff narcotics,” which would undermine the result and reasoning in Place. Kyllo, 533 U.S. at 47 (Stevens, J., dissenting). Justice Stevens also contended that Kyllo's rule was unnecessarily broad because it covers any information regarding the interior of a home. Id. “If it takes sensitive equipment to detect an odor that identifies criminal conduct and nothing else, the fact that the odor emanates from the interior of a home should not provide it with constitutional protection.” Id. at 48. At the same time, Justice Stevens criticized Kyllo's holding as being too narrow. Clearly, a rule that is designed to protect individuals from the overly intrusive use of sense-enhancing equipment should not be limited to a home. If such equipment did provide its user with the functional equivalent of access to a private place—such as, for example, the telephone booth involved in Katz, or an office building—then the rule should apply to such an area as well as to the home. Id. at 48-49 (Stevens, J., dissenting). 248 Id. at 51. 249 See generally, Albert W. Alschuler, Bright Line Fever and the Fourth Amendment, 45 U. P ITT. L. REV. 227 (1984); Wayne R. LaFave, The Fourth Amendment In An Imperfect World: On Drawing “Bright Lines” and “Good 246 247 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 105 principle explaining the Court's willingness to use (or not use) bright-line rules. “[B]right lines will be applied when the Court decides to apply them.”250 There is no reason to think that Kyllo will alter this situation. Justice Scalia's triumph in Kyllo in persuading a majority of his colleagues on the benefits of bright-line rules will likely be a temporary victory. The Court's most recent cases demonstrate how unlikely it is that Kyllo's preference for bright-line rules will have a lasting impact. In the same Term in which Kyllo adopted a per se rule for determining whether thermal imaging was a search, the Court adopted a balancing analysis rather than a per se rule in another case involving the scope of protection the Fourth Amendment provides for the home. Decided four months prior to Kyllo, Illinois v. McArthur251 concerned whether police, who had probable cause that marijuana was in a home, could seize the home and prevent the homeowner from entering his premises unaccompanied by an officer for approximately two hours while a search warrant was being obtained. 252 The Court concluded that the seizure was lawful. 253 Two police officers accompanied Charles McArthur's wife when she went to his trailer-home to remove her belongings. 254 When the wife and the officers arrived, McArthur was inside his home.255 The officers remained outside while the wife retrieved her possessions. 256 After gathering her belongings, the wife informed the officers that McArthur had concealed “`some dope underneath the couch.'”257 The officers then knocked on the door and requested permission to search the home.258 McArthur denied the request while standing outside his trailer.259 The officer in Faith”, 43 U. P ITT. L. REV. 307 (1982); cf. Tracey Maclin, The Fourth Amendment on the Freeway, [hereinafter, The Fourth Amendment on the Freeway], 3 RUTGERS RACE & L. REV. 117, 151-57 (2001) (arguing that the Court has yet to articulate a principled rule for deciding when a bright-line rule controls a Fourth Amendment issue involving a traffic stop). 250 Maclin, The Fourth Amendment on the Freeway, supra note 249, at 157. 251 531 U.S. 326 (2001). 252 McArthur, 531 U.S. at 329. 253 Id. at 331. 254 Id. at 328. 255 Id. at 328-29. 256 Id. at 329. 257 Id. 258 Id. 259 Id. The officer in charge could not “recall whether he told [McArthur] to come out of the trailer or if [McArthur] came out on his own.” People v. 105 FILE:C:\WP51\72-1\MACLIN.DTP 106 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 charge then told McArthur that he could not reenter his home without a police escort.260 The second officer left the scene to obtain a search warrant. 261 Two hours later, authorized by a search warrant, the police searched McArthur's home and found a small amount of marijuana and drug paraphernalia under the sofa.262 McArthur was charged with two misdemeanor offenses. 263 The Illinois judiciary sustained his claim that the police seizure of his home violated the Fourth Amendment, but Justice Breyer's opinion reached a different conclusion.264 According to Justice Breyer, the central requirement of the Fourth Amendment is “reasonableness.”265 He explained that the Court interprets reasonableness “as establishing rules and presumptions designed to control conduct of law enforcement officers that may significantly intrude upon privacy interests.”266 Sometimes reasonableness requires warrants, but not always. Considering the totality of the circumstances in McArthur, Justice Breyer would not say “that the warrantless seizure was per se unreasonable.”267 Rather than announcing a bright-line rule, McArthur “balance[d] the privacy-related and law enforcement related concerns to determine if the intrusion was reasonable.”268 Under a balancing formula, Justice Breyer concluded that the seizure was reasonable.269 Why does the Court adopt a bright-line rule in Kyllo, but McArthur, 713 N.E.2d 93, 94 (Ill. App. 4 Dist. 1999), reversed, 531 U.S. 326 (2001). McArthur's presence inside his home was a critical factor in the lower court's decision to sustain McArthur's Fourth Amendment claim. See McArthur, 713 N.E.2d at 98. For a discussion of why this point was critical to the constitutional issue in McArthur, see Craig M. Bradley, Illinois v. McArthur: Preserving Evidence Pending Search Warrants, T RIAL, J UNE 2001, at 70; Tracey Maclin, Let Sleeping Dogs Lie: Why The Supreme Court Should Leave Fourth Amendment History Unabridged, 82 B.U. L. REV. 895, 934-35 (2002). 260 McArthur, 531 U.S. at 329. 261 Id. 262 Id. 263 Id. McArthur was charged with unlawfully possessing drug paraphernalia and marijuana (less than 2.5 grams). 264 Id. at 329-31. 265 Id. at 330. 266 Id. at 330. 267 Id. at 331. According to Justice Breyer, the facts involved “a plausible claim” of exigent circumstances. He also noted that the seizure was tailored to the police need, was limited in time and scope, and avoided “significant intrusion into the home itself.” Id. 268 Id. (citing Delaware v. Prouse, 440 U.S. 648 (1979) and United States v. Brignoni-Ponce, 442 U.S. 873 (1975) which were not “house” cases). 269 Id. For a critique of McArthur and an explanation why McArthur failed to address the crucial issue confronting the Court, see Bradley, supra note 259, at 70 (arguing that “the issue here is not one of sealing unoccupied premises but of seizing an occupied dwelling and ejecting the occupant”). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 107 prefer a balancing test in McArthur, even though both cases concern the sanctity and security of a home? One might say that because Kyllo involved the “threshold” issue of whet h e r a search occurred, a per se rule is necessary to provide guidance for police officers. If the challenged police conduct does not involve a “search” within the meaning of the Fourth Amendment, police officers need not worry about the “reasonableness” of their actions. They are free to proceed without obtaining a warrant, and they need not worry whether they have probable cause or reasonable suspicion of criminality to justify their intrusion. On the other hand, in McArthur there was no question that a seizure had occurred. Thus, the “threshold” issue of whether the police conduct triggered Fourth Amendment scrutiny was not on the table. The only question confronting the Court concerned the “reasonableness” of the seizure. Reasonableness generally—although not always—requires a consideration of the totality of the circumstances. If this explanation accurately describes the Court's approach, then Kyllo and McArthur—rather than illustrate the Court's unprincipled approach toward bright-line rules—demonstrate a coherent theme. But the two most recent cases involving whether a police intrusion constitutes a search, Minnesota v. Carter270 and Bond v. United States,271 cast doubt on the validity of this explanation. An earlier discussion noted the differences between Kyllo, which adopted a bright-line rule, and Minn esota v. Carter, which eschewed a per se rule for determining whether guests or visitors will have an expectation of privacy in their host's home. 272 Although both Carter and Kyllo involved the threshold issue of whether a search occurred, the Court took divergent paths to resolve this issue.273 Carter is not the only recent case where the Rehnquist Court avoids bright-line rules for determining whether a search has occurred. Bond v. United States,274 decided a year before Kyllo, concerned whether an officer's squeeze of luggage triggered Fourth Amendment protection.275 Steven 270 271 272 273 274 275 525 U.S. 83 (1998). 529 U.S. 334 (2000). See supra notes 78-102 and accompanying text. Compare Carter, 525 U.S. at 91 with Kyllo, 533 U.S. at 40. 529 U.S. 334 (2000). Bond, 529 U.S. at 335. 107 FILE:C:\WP51\72-1\MACLIN.DTP 108 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 Dewayne Bond was a passenger on an interstate bus that was stopped at a border patrol checkpoint in Texas. An immigration officer squeezed Bond's canvas bag that was in the overhead compartment. The officer felt a “brick-like” object inside. A search of the bag revealed a “brick” of methamphetamine. The issue before the Court was whether the officer's squeeze constituted a search.276 Writing for a seven Justice majority, Chief Justice Rehnquist ruled that the squeeze was a search. First, the Chief Justice explained that the officer's motive for touching the bag was irrelevant to the constitutional issue.277 He then explained that while a bus passenger may expect that others will handle his luggage, a passenger “does not expect that other passengers or bus employees will, as a matter of course, feel the bag in an exploratory manner.”278 Because the officer's squeeze was probing rather than the equivalent of what a passenger might do to create more room in the overhead rack, the Chief Justice held that a search occurred.279 In sum, Carter and Bond demonstrate that the Rehnquist Court is not devoted to bright-line rules when determining the scope of the Fourth Amendment. Notwithstanding sensible arguments to the contrary,280 the Court established a legal framework where the constitutional rights of house guests and interstate travelers will depend on a balancing process that will be initially conducted by police officers who may be disinclined to respect the Fourth Amendment rights of individuals. Unlike the per se rule announced in Kyllo, the totality tests of Carter and Bond afford scant guidance to officers interested in knowing whether their actions trigger constitutional safeguards. In sum, the reasoning and results in Kyllo, Carter and Bond illustrate that the Court has yet to articulate a coherent rationale for deciding when a bright-line rule will be used to resolve whether a police intrusion constitutes a search under the Fourth Amendment. 276 Id. at 35-36. See Id. at 338 n.2 (“[T]he issue is not his state of mind, but the objective effect of his actions.”). 278 Id. at 338-39. 279 Id. at 339. 280 See Minnesota v. Carter, 525 U.S. 83, 106-09 (1998) (Ginsburg, J., dissenting) (explaining why social guests and visitors should be entitled to rely on the privacy of their host's home). In Bond, Justice Breyer contended that the reasoning in that case “will lead to a constitutional jurisprudence of `squeezes,' thereby complicating further already complex Fourth Amendment law, increasing the difficulty of deciding ordinary criminal matters, and hindering the administrative guidance (with its potential for control of unreasonable police practices) that a less complicated jurisprudence might provide.” Bond, 529 U.S. at 342 (Breyer, J., dissenting). 277 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 109 Even if one believes that threshold cases justify the use of per se rules and cases resolving the “reasonableness” of a challenged search or seizure should be resolved under a balancing formula, this distinction does not account for the methodology utilized in McArthur. As noted above, the Court has afforded the home the most scrupulous protection under the Fourth Amendment. 281 To promote the home's security, the Court has essentially adopted a per se rule regarding police intrusions into the home: “[T]he Fourth Amendment has drawn a firm line at the entrance to the house. Absent exigent circumstances, that threshold may not reasonably be crossed without a warrant.”282 Granted, the police action in McArthur did not involve a forcible search or entry into a home, but it did breach the security McArthur enjoyed in his home. McArthur was inside his home when the police knocked and requested permission to search inside. When McArthur denied permission, he was forcibly detained outside his home while a search warrant was obtained.283 This action certainly implicated the Fourth Amendment's explicit guarantee of a right “to be secure” in one's home.284 Also, the need for police action in McArthur was less urgent than the justification rejected in Welsh v. Wisconsin,285 which held the gravity of an offense is an important factor to consider when deciding whether exigency exists to justify a warrantless arrest inside a home.286 See notes 91-100 and accompany text. Payton v. New York, 445 U.S. 573, 590 (1980); see also Kirk v. Louisiana, 122 S. Ct. 2458, 2459 (2002) (“police officers need either a warrant or probable cause plus exigent circumstances in order to make a lawful entry into a home”). 283 Illinois v. McArthur, 531 U.S. 326, 329 (2001). 284 Although there was no forcible entry of his home, McArthur's right to enjoy full possession of his home and right to be secure within his home was disturbed by the police action. Cf. Clancy, supra note 238, at 541 (explaining that “the essential attribute of the right to be secure is the ability of the individual to exclude the government from intruding. Thus, . . . as to a seizure of property, the individual may exercise the right to remain in possession . . . . This ability to exclude is so essential to the exercise of the right to be secure that is proper to say that it is the equivalent to the right—the right to be secure is the right to exclude.”); Clancy, supra note 1, at 357 (same); Adler, supra note 242, at 1120 (asserting that “the Founders' ultimate desire was not that the government be reasonable but rather that the people be secure in their persons, houses, papers, and effects”). 285 466 U.S. 740 (1984). 286 Welsh, 466 U.S. at 753. The police arrested Welsh inside his home without a warrant after they developed probable cause that Welsh had been driving while intoxicated. The state argued that exigent circumstances justified the arrest because evidence of Welsh's blood-alcohol level might have dissipated while waiting for a warrant to be secured. Id. at 753. The Welsh Court, 281 282 109 FILE:C:\WP51\72-1\MACLIN.DTP 110 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 Concededly, reasonable minds can differ over whether th e Court correctly resolved the issue at stake in McArthur.287 My concern here is not whether the Court correctly decided the merits in McArthur; instead, my focus is on the methodology that the Court used to resolve the merits. Police intrusions that affect the security and sanctity of the home have traditionally been resolved by bright-line rules. 288 McArthur bucks that trend, but its explanations for eschewing a brightline rule are hardly satisfying.289 On the other hand, Kyllo, however, invalidated the arrest because the state classified the offense “as a noncriminal, civil forfeiture offense for which no imprisonment was possible.” Id. at 754 (citation omitted). In fact, Welsh moves close to announcing a per se rule against warrantless entries for arrest in cases of minor crimes. See id. at 753 (“[W]e note that it is difficult to conceive of a warrantless home arrest that would not be unreasonable under the Fourth Amendment when the underlying offense is extremely minor.”); id. (“[A]pplication of the exigent-circumstances exception in the context of a home entry should rarely be sanctioned when there is probable cause to believe that only a minor offense, such as the kind at issue in this case, has been committed.”). In McArthur, Justice Breyer distinguishes Welsh on two grounds. McArthur, 531 U.S. at 336. First, he states that McArthur was detained for a “`jailable'” offense, whereas Welsh involved a “`nonjailable'” offense. Id. Second, he notes that the seizure involved in McArthur “is considerably less intrusive” than a police entry into a home to affect a warrantless arrest. Id. On the issue of exigency, Justice Breyer states that the facts in McArthur involve “a plausible claim” of exigent circumstances. Id. at 331. 287 Professor Bradley calls the issue at stake in McArthur a “festering issue: When may police act to preserve evidence pending the arrival of a search warrant when they fear that someone inside the building may destroy the evidence?” Bradley, supra note 259, at 73. 288 Exceptions to this statement may be Maryland v. Buie, 494 U.S. 325 (1990) and Richards v. Wisconsin, 520 U.S. 385 (1997). Buie held that the police may, while effecting the arrest of a felon in his home pursuant to an arrest warrant, conduct a protective sweep of a home when they have reasonable suspicion that the premises harbor an individual posing a danger to the officers or others. Buie, 494 U.S. at 337. Richards ruled that an unannounced entry into a home is permissible where the police have reasonable suspicion that knocking and announcing their presence and purpose would threaten officer safety or risk the destruction of evidence. Richards, 520 U.S. at 395. 289 McArthur, 531 U.S. at 336. Justice Breyer explains that under the circumstances, “we cannot say that the warrantless seizure was per se unreasonable.” Id. at 331. He then proffers two reasons for this conclusion. First, the facts involved “a plausible claim of specially pressing or urgent law enforcement need, i.e., `exigent circumstances.'” Id. Second, he notes that the seizure of McArthur “was tailored to that need, being limited in time and scope, and avoiding significant intrusion into the home itself.” Id. Justice Breyer's first justification for the seizure—“a plausible claim” of exigency—“is a concept unknown in the Court's Fourth Amendment jurisprudence, and [he] made no effort to explain it.” Maclin, supra note 259, at 935 n.182. Judges and police officers will undoubtedly have trouble determining the difference between exigent circumstances, which permits a warrantless entry of a home to effect an arrest or search, see Minnesota v. Olson, 495 U.S. 91, 101 (1990), and “a plausible claim” of exigency, which, after McArthur permits something less than a full-blown seizure of a home, and an implausible claim of exigency, which presumably would not have permitted the seizure upheld in McArthur. Justice Breyer's second justification for upholding the seizure—it was “both limited and tailored reasonably to secure law enforcement needs while protecting privacy FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 111 decided four months after McArthur, utilizes a bright-line rule to determine whether police conduct directed at a home implicates the Fourth Amendment. 290 Kyllo's preference for drawing a firm and bright line at the entrance to the house is equally applicable in McArthur: Absent exigent circumstances, police officers should not be allowed to disturb an individual's right “to be secure” in his home without a warrant. Although both cases involve the sanctity and security of a private home, the choice to employ a per se rule in Kyllo and a balancing test in McArthur, is not explained by the Court nor deciphered by examining the Court's relevant precedents. C. Kyllo's Emphasis on the Home The third and final reason to question Kyllo's long-term impact for protecting Fourth Amendment rights, ironically, concerns Kyllo's strongest feature: its emphasis on the home.291 The driving force of Justice Scalia's opinion was that interests”—typifies the fact-specific balancing often seen in Justice Breyer's search and seizure opinions. See, e.g., Bd. of Ed. v. Earls, 122 S. Ct. 2559, 256971 (2002) (Breyer, J., concurring) (listing factors that make drug testing program valid); Wyoming v. Houghton 526 U.S. 295, 308 (1999) (Breyer, J., concurring) (distinguishing between searching a woman's purse found on the backseat of a car, and searching a purse “attached to her person”); Minnesota v. Carter, 525 U.S. 83, 103-05 (1998) (Breyer, J., concurring) (asserting that the record did not support the factual conclusions of the lower court's determination that an officer's conduct constituted a search). But this approach to Fourth Amendment issues has its own problems, as Justice Breyer knows. See Bond v. United States, 529 U.S. 334, 342 (2000) (Breyer, J., dissenting) (complaining that the Court's ruling on whether an officer's squeeze of luggage constitutes a search complicates “already complex Fourth Amendment law, [and] increas[es] the difficulty of deciding ordinary criminal matters, and hinder[s] the administrative guidance (with its potential for control of unreasonable police practices) that a less complicated jurisprudence might provide”); see also, Wayne R. LaFave, “Case-By-Case Adjudication” versus “Standardized Procedures”: The Robinson Dilemma, 1974 SUP. CT. REV. 127, 141 (“A highly sophisticated set of rules, qualified by all sorts of ifs, ands, and buts and requiring the drawing of subtle nuances and hairline distinctions, may be the sort of heady stuff upon which the facile minds of lawyers and judges eagerly feed, but they may be `literally impossible of application by the officer in the field.'”) (footnote omitted). 290 Kyllo v. United States, 533 U.S. 27, 40 (2001). 291 In his article on Kyllo, Professor Seamon describes Kyllo as an important case and also highlights the Court's emphasis on the home. See Richard H. Seamon, Kyllo v. United States And the Partial Ascendance of Justice Scalia's Fourth Amendment, 79 WASH. U.L.Q. 1013 (2001). According to Professor Seamon, Kyllo is a significant ruling, in part, “because it reinforces the narrowing of the once broad warrant presumption in two ways. First, by departing from the reverse Katz test [the tendency by the Court to find that government conduct is not a search for Fourth Amendment purposes], Kyllo 111 FILE:C:\WP51\72-1\MACLIN.DTP 112 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 a thermal imager discloses information regarding the interior of a home.292 While Justice Scalia willingly conceded that the challenged intrusion in Kyllo's case involved an insignificant compromise of a homeowner's privacy, 293 that fact was unimportant. The trivial nature of the intrusion was irrelevant because—from the Founder's era to modern times—private homes have been protected against warrantless police searches. Thus, Scalia explained that the Court “must take the long view, from the original meaning of the Fourth Amendment forward.”294 This meant that a search warrant was required before police could utilize a thermal imager to determine the relative heat that was emanating from Kyllo's home.295 To a certain extent, Kyllo's emphasis on the home is understandable. There are textual, historical and practical reasons why the Court's Fourth Amendment jurisprudence has afforded the home special protection. Kyllo continues this trend, notwithstanding the limited information that the thermal imaging revealed. Practically speaking, however, giving special protection to the home, but reduced or no protection to other areas, may be short-sighted, particularly if the Court is concerned about technological advances that may block future resort to that test as a means of shoring up the illusion of a broad warrant presumption. Second, Kyllo articulates the new, narrow version of the presumption, under which the warrant requirement applies most stringently to searches of the home.” Id. at 1029. Although Professor Seamon generally applauds the result in Kyllo, a student commentator calls Kyllo “a dangerous opinion” because Justice Scalia: has crafted an opinion that moves the Court even further in reverse, back toward a Fourth Amendment jurisprudence based on place. And the only place that Justice Scalia appears to believe that warrants full protection is the interior of the home. The test he develops for whether government use of a technology constitutes a search offers little to no protection to information generated by new technologies. Andrew Riggs Dunlap, Fixing the Fourth Amendment with Trade Secret Law: A Response to Kyllo v. United States, 90 GEO. L.J. 2175, 2176 (2002). According to Dunlap, Kyllo's “reasoning should produce alarm” because it embraces “a view of the Fourth Amendment that buckles and gives way once a citizen, or his or her information, passes outside the home.” Id. at 2187, 2189-90. While I agree that in future cases the Court is likely to read Kyllo's holding narrowly, there is noting in Kyllo itself that demands this narrow interpretation. 292 Kyllo, 533 U.S. at 35 n.2 (“A thermal imager reveals the relative heat of various rooms in the home. The dissent may not find that information particularly private or important, but there is no basis for saying it is not information regarding the interior of the home.”) (citations omitted). 293 Id. at 40. 294 Id. 295 Id.; see also David O. Markus & Mona Markus, The Heat is On: Thermal Imaging and the Fourth Amendment, T HE CHAMPION Dec., 1998, at 22-24 (preKyllo article arguing that the use of thermal imaging requires a judicial warrant). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 113 intrude upon privacy. As Justice Stevens suggested, if senseenhancing technology gives the government “the functional equivalent of access to a private place,” then the reach of the Fourth Amendment protective umbrella should not be confined to the home.296 Although the facts in Kyllo did not require the Court to discuss how its analysis might affect other areas and places entitled to constitutional protection, Kyllo's stress on the home may provide a distinguishing point in future cases where the Court has to judge the use of thermal imaging or similar sense-enhancing equipment directed at targets other than houses. If the Court's past precedents are predictive of future results, the odds are good that Kyllo's protective reach will be confined to the home. Indeed, the facts and holding of United States v. Karo297—another case involving electronic surveillance—reveals the limits of a judicial analysis focused on the home and may provide the template for limiting Kyllo. In Karo, federal drug agents learned that the defendants had ordered several gallons of ether in order to extract cocaine from clothing that had been imported into the country. The agents placed an electronic beeper in a can of ether that was sold to the defendants. 298 Over a four month period, using both visual and electronic surveillance, the agents tracked the beeper as it arrived and left several private homes and two commercial storage facilities. Finally, the agents obtained a search warrant for a private residence where the beeper-laden can was located. Inside that home, they found cocaine.299 Two issues confronted the Court: First, whether installation and transfer of the beeper-laden can to a buyer unaware of the beeper's presence triggered Fourth Amendment protection.300 Second, whether monitoring of the beeper was a search when it revealed information that could not have been obtained through visual surveillance.301 On the Kyllo, 533 U.S. at 48 (Stevens, J., dissenting) (citation omitted). 468 U.S. 705 (1984). 298 The agents received a warrant for the installation and transfer of the beeper-laden can, but that warrant was later invalidated for misleading statements in the affidavit. Karo, 468 U.S. at 719 n.5. 299 Id. at 708-10. 300 Id. at 712. 301 Id. at 714. On the first issue, Karo ruled that installation and transfer of the beeper-laden can was neither a search nor seizure. Id. No search occurred because the transfer of an unmonitored beeper “conveyed no information at all. To be sure, it created a potential for an invasion of privacy, but we have never held that potential, as opposed to actual, invasions of privacy constitute searches. 296 297 113 FILE:C:\WP51\72-1\MACLIN.DTP 114 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 second issue, Karo ruled that “monitoring of a beeper in a private residence, a location not open to visual surveillance, violates the Fourth Amendment rights of those who have a justifiable interest in the privacy of the residence.”302 Seven Justices in Karo agreed that monitoring a beeper in a private home constitutes a search.303 The Court was split, however, over whether monitoring the beeper to determine that it was located somewhere in a storage facility constituted a search. Writing for the majority, Justice White explained that no search occurred because the beeper disclosed only that the can was “somewhere in the warehouse.”304 The monitoring did not “identify the specific locker” which contained the beeper-laden can.305 Nor did the monitoring reveal anything about the “contents” of the locker the defendants had rented.306 Justice Stevens, however, took issue with this conclusion. He noted the agents were unaware of the beeper's location after its initial entrance into a private home. “From that moment on it was concealed from view.”307 The . . .” Id. at 712. No seizure occurred either: “Although the can may have contained an unknown and unwanted foreign object, it cannot be said that anyone's possessory interest was interfered with in a meaningful way.” Id. 302 Id. at 714. The Court explained that beeper monitoring reveals “that a particular article is actually located at a particular time” in a home. Id. at 715. “Even if visual surveillance has revealed that the article to which the beeper is attached has entered the house, the later monitoring not only verifies the officers' observations but also established that the article remains on the premises.” Id. at 715. 303 Id. at 721. Justice O'Connor, with Justice Rehnquist joining her, stated that “the mere presence of electronic equipment inside a home, transmitting information to governments agents outside, does not, in and of itself, infringe on legitimate expectations of privacy of all who have an expectation of privacy in the home itself.” Id. at 722 (O'Connor, J., concurring). She relied on White, which permitted the use of information obtained from within a home by means of a microphone secreted on a government agent. Id. In O'Connor's view, the crucial question in Karo is the defendant's interest in the container in which the beeper is placed. Id. at 724. “When a closed container is moved by permission into a home, the homeowner and others with an expectation of privacy in the home itself surrender any expectation of privacy they might otherwise retain in the movements of the container-unless it is their container or under their dominion or control.” Id. (footnote omitted). According to Justice O'Connor, the beeper “transmitted information about the location, not the contents, of the container . . . . By giving consent to another to move a closed container into and out of the home the homeowner has effectively surrendered his privacy insofar as the location of the container may be concerned, or so we should assume absent evidence to the contrary. In other words, one who lacks dominion and control over the object's location has no privacy interest invaded when that information is disclosed.” Id. at 727. 304 Id. at 720. 305 Id. 306 Id. After the beeper monitoring revealed that the can was located in the storage facility, the locker containing the beeper-laden can was “identified only when agents traversing the public parts of the facility found that the smell of ether was coming from a specific locker.” Id. at 720-21. 307 Karo, 468 U.S. at 735 (Stevens, J., dissenting). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 115 agents discovered the beeper's location in the storage facility by electronic surveillance.308 “Without the beeper, the agents would have never found the warehouse . . . .”309 Thus, Stevens concluded that because the monitoring “enabled the agents to learn the location of personal property otherwise concealed from public view,” it was a search.310 The contrasting opinions of Justices White and Stevens illustrate the limits of a judicial analysis that emphasizes the home. According to the Karo majority, police may use electronic beeper surveillance free of constitutional scrutiny provided the monitoring discloses only “the general vicinity, and not the precise private location, of the [beeper].”311 Justice White's judgment that “general vicinity” monitoring is not a search might not bother an agoraphobe, but it is an odd way to construe the Fourth Amendment, which protects other places and effects beside houses. Justice White is understandably concerned that “[i]ndiscriminate monitoring of property that has been withdrawn from public view would present far too serious a threat to privacy interests in the home to escape entirely some sort of Fourth Amendment oversight.”312 But does the exact same “[i]ndiscriminate monitoring of property that has been withdrawn from public view” not present a similar serious threat to privacy interests when that surveillance reveals that property is located at a commercial storage facility, college campus or hotel resort? The fact that the indiscriminate monitoring did not identify the specific locker containing the property is beside the point. “The property was concealed from public view; its location was a secret and hence by revealing its location the beeper infringed an expectation of privacy.”313 Under Justice White's view, police are free to install covert electronic tracking devices on any item available for commercial purchase, for example, a book, suitcase or rental car. If later monitoring reveals that the property is located at a certain hotel resort or on a particular college campus, no search occurs provided the monitoring does not identify the specific room in which a 308 309 310 311 312 313 Id. Id. at 735 n.11. Id. at 734-35. Fishman, supra note 160, at 342. Karo, 468 U.S. at 716 (footnote omitted). Id. at 735, n.11 (Stevens, J., dissenting). 115 FILE:C:\WP51\72-1\MACLIN.DTP 116 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 person is staying.314 It may be possible in future cases to distinguish the thermal imaging directed at a home from thermal imaging directed at an office or other business facility.315 Similarly, the Court may treat thermal imaging or other scientific searches of vehicles differently from the search in Kyllo.316 Automobiles 314 See Fishman, supra note 160, at 345. Professor Fishman recognizes that under Karo's logic, it would appear that so long as the monitoring does not disclose conclusively which of two or more private locations (houses, hotel rooms, lockers, automobile trunks, or whatever) contains the beepered object, monitoring the beeper does not constitute a search. Such a rule would significantly diminish the privacy-enhancing impact the Court's holding in Karo that private location monitoring constitutes a search. Fishman, supra note 160 at 345 (footnotes omitted). Interestingly, Professor Fishman criticizes Justice Stevens' conclusion that a search occurred when the agents in Karo utilized monitoring to determine that the beeper-laden can was located somewhere in the storage facility. According to Professor Fishman, this view “sweeps too broadly.” Fishman, supra note 160, at 342. Professor Fishman explains: Had the agents maintained visual surveillance of the first storage facility, they could have observed the suspects transfer the ether from the first to the second warehouse. Further, upon learning that the ether had been removed from the first facility, the agents could have interviewed personnel at every other storage facility in Albuquerque until, with luck they found the warehouse in question. Alternatively, in theory, an informer might have learned of the ether's new location and reported it to the authorities. Any of these techniques would have “enabled the agents to learn the location of property otherwise concealed from public view,” yet none of them would have “infringed upon a privacy interest protected by the Fourth Amendment.” Why should using a beeper, to determine only the general vicinity to which the ether had been moved, be regarded differently? Justice Stevens enunciates no persuasive reason. Fishman, supra note 160, at 342-43 (emphasis added). Professor Fishman's criticism of Justice Stevens resembles the reasoning of Knotts. In Knotts, the Court concluded that because officers “could have” observed the defendant as he traveled across the highways of Minnesota and Wisconsin, the Fourth Amendment does not bar the use of electronic surveillance equipment to allow the police to do the same. United States v. Knotts, 460 U.S. 276, 285 (1983) (emphasis added). The problem with both Knotts's reasoning and Professor Fishman's analysis is that they each prove too much. As noted earlier, see notes 164-74 and accompanying text, one can always imagine methods in which police are able to detect useful information. 315 In recent years, the Court has authorized warrantless and suspicionless searches of business offices and other premises on the basis of grounds that would not allow searches of homes. See, e.g., New York v. Burger, 482 U.S. 691 (1987) (upholding warrantless, suspicionless search of automobile junkyard business on “special needs” theory); O'Connor v. Ortega, 480 U.S. 709 (1987) (searching of government employee's office assessed under “special needs” model; validity of the search “should be judged by the standard of reasonableness under all the circumstances”); but cf. Marshall v. Barlow's Inc., 436 U.S. 307 (1978) (invalidating warrantless search of business). 316 See, e.g., Dery, supra note 242, at 403. Professor Dery describes the many uses of the Enclosed Space Detection System (ESDS). The ESDS, or heartbeat detector, is a surveillance tool designed to detect the presence of people `hiding in enclosed spaces of vehicles' by FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 117 are entitled to a lesser degree of privacy than that given to houses. Therefore, a thermal imaging “search” or similar intrusion directed at a vehicle might not trigger Fourth Amendment protection, even though the intrusion reveals information “that would previously have been unknowable without [a] physical intrusion.”317 By combining the Court's judgment that vehicles are afforded diminished privacy protection, Karo's conclusion that general vicinity monitoring is not a search, and Kyllo's emphasis on the home, an analytical framework emerges that permits the Court to find that thermal imaging of targets other than houses does not implicate the Fourth Amendment. In sum, Kyllo is an important ruling that expands Fourth Amendment protection. But Kyllo's impact on future cases involving the Fourth Amendment and technology, beyond its limited fact pattern, is uncertain. If Karo's reasoning on general vicinity monitoring is followed in future cases, the holding of Kyllo is unlikely to prevent government officers from using sophisticated technology to monitor or reveal information that is otherwise not exposed to public view. IV. CARNIVORE MEETS KYLLO As noted above, Kyllo's long-term impact on search and seizure doctrine is uncertain. On the one hand, Kyllo may provide significant protection against future technological intrusions. In addition to reaffirming the principle that Fourth Amendment protection does not require a physical identifying the presence of a `human ballistocardiogram.' With each beat of the human heart, a ballistocardiogram or a small mechanical shock wave propagates through the body. This shock wave, in turn, causes the entire vehicle holding the person to vibrate `at a frequency dissimilar from any other source.' Dery, supra note 21, at 653 (footnotes omitted). 317 Kyllo v. United States, 533 U.S. 27, 40 (2001). Karo's holding does not resolve whether electronic detection of an item concealed inside a vehicle constitutes a search. Professor LaFave explains that there is some “uncertainty” about the scope of Karo's reach. L AF AVE, supra note 21, at 653. (noting that the Court initially frames the issue in broad terms as to “whether the monitoring of a beeper [is a search] when it reveals information that could not have been obtained through visual surveillance,” but later in its opinion narrowly frames the issue as to “whether the monitoring of a beeper in a private residence, a location not open to visual surveillance” is a search) (emphasis added). According to Professor LaFave, Karo could be read to mean that beeper surveillance that reveals that a container is concealed inside a vehicle or other private location still amounts to a search, even though the surveillance is not directed at a private residence. L AF AVE, supra note 21, at 653. 117 FILE:C:\WP51\72-1\MACLIN.DTP 118 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 intrusion into the home—a rule often ignored in previou s cases involving technological intrusions—Kyllo also rejected the claim that disclosure of intimate details was necessary before a government intrusion would be deemed a search.318 After Kyllo, all details regarding the interior of the home are constitutionally protected “because the entire area is held safe from prying governmental eyes.”319 On the other hand, Kyllo's protective impact may be blunted in future cases. Kyllo's logic undercuts the holding in Smith v. Maryland and suggests that a dog sniff of a home is a search notwithstanding the contrary implication coming from Place. In light of the tension between Kyllo and these cases and because the Court is unlikely to overrule Smith or limit the logic of Place to luggage and automobiles, Kyllo's holding may be confined to thermal imaging intrusions. Moreover, there is nothing in the Kyllo opinion that commits the Court to using “bright line” rules in future cases involving technological intrusions affecting the home. Finally, because Kyllo emphasized the traditional protection afforded private homes, it will be easy to distinguish Kyllo where technological intrusions do not target houses. Logically, the rule announced in Kyllo should “protect individuals from the overly intrusive use of sense-enhancing equipment” in other areas entitled to c o n s t i t u t i o n a l p r o t e c t i o n . 320 Yet, if the analysis of Karo—which Kyllo cites approvingly—is followed in future cases, Kyllo's holding will not cover sense-enhancing equipment that reveals private information in protected areas outside of houses. A possible test of Kyllo's strength (or weakness) may come soon. The Court has not addressed the constitutional status of e-mail communications, and lower court rulings on the subject are sparse. 321 Normally, the Court is reluctant to address an issue that has not been percolating in the lower courts. 322 Kyllo, 533 U.S. at 38. Id. at 37. Id. at 48 (Stevens, J., dissenting). 321 See Peter J. Georgiton, The FBI's Carnivore: How Federal Agents May Be Viewing Your Personal E-Mail and Why There Is Nothing You Can Do About It, 62 OHIO ST. L.J. 1831, 1838 (2001) (noting that the Court has not determined whether there is a “reasonable expectation of privacy in our personal home email accounts, and there is little case law directed to the issue as well”). 322 See SUP. CT. R. 10; ROBERT L. STERN ET AL., SUPREME COURT P RACTICE 228 n.18 (8th ed. 2002) (“In some cases the Justices may feel that the time is not ripe for the Court to resolve a conflict, preferring to await further litigation that might produce a consensus or a satisfactory majority view among the lower courts.”); id. at 230 (quoting Gilliard v. Mississippi, 464 U.S. 867 (1983) (Marshall, J., dissenting from denial of certiorari)) (addressing “`those of my Colleagues who agree with me [on merits of issue] but believe that this Court should 318 319 320 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 119 However, the constitutional questions surrounding Carnivore, the Federal Bureau of Investigation's controversial Internet surveillance program, may require the Court to address the constitutional status of e-mail communications coming from a home computer. If such a case arises, the Court may be confronted with a conflict between Kyllo's holding and the government's claim that certain applications of Carnivore do not constitute searches under the Fourth Amendment. 323 The exact contours and capabilities of Carnivore are still subject to debate.324 Briefly stated, Carnivore is a computerbased search program that allows the FBI to intercept electronic communications that travel on the internet. 325 postpone consideration of the issue until more state supreme courts and federal circuits have experimented with substantive and procedural solutions to the problem'”). 323 See Fourth Amendment Issues Raised by the FBI's “Carnivore” Program: Hearing Before the House Subcomm. on the Constitution, House Comm. on the Judiciary, 106th Cong. (2000) [hereinafter House Hearing] (statement of Donald M. Kerr, Assistant Director, Federal Bureau of Investigation) (“We do, in fact, have legal authority to do what we are doing today, and I think it is because of the correct belief, from my perspective, that the addressing information on the Internet is, in fact, a useful and appropriate analog to the telephone number in the switch circuit world.”); The `Carnivore' Controversy: Electronic Surveillance and Privacy in the Digital Age: Hearing Before the Senate Comm. on the Judiciary, 106th Cong. (2000) [hereinafter Senate Hearing] (statement of Kevin DiGregory, Deputy Associate Attorney General Department of Justice) (“We don't think that there should be a different standard for the interception of emails versus the interception of telephones—excuse me; I used the word “interception”—for a pen register or a trap and trace for e-mails as opposed to a pen register or trap and trace for telephones.”). 324 See Maricela Segura, Note, Is Carnivore Devouring Your Privacy?, 75 S. CAL. L. REV. 231, 233 (2001) (noting that even “after independent review of Carnivore, questions linger about the program's actual capabilities”). 325 For a comprehensive description of Carnivore, see ILLINOIS INSTITUTE OF T ECHNOLOGY RESEARCH INSTITUTE , Independent Review of the Carnivore System, Final Report (Dec. 8, 2000, at vii, available at http://www.usdoj.gov/jmd/ publications/carniv_final.pdf (“Carnivore is a soft-ware based tool used to examine all Internet Protocol (IP) packets on an Ethernet and record only those packets or packet segments that meet very specific parameters.”) [hereinafter IITRI REPORT]; see also Ku, supra note 1, at 1355 (“Like an information roadblock, [Carnivore] screens all traffic, but pulls over only the data packets it has been programmed to capture.”); Trenton C. Haas, Note, Carnivore and the Fourth Amendment, 34 CONN. L. REV. 261, 271 (2001) (“Carnivore is an Internet surveillance system or diagnostic tool, which—when equipped with special filtering software—gathers informational packets traveling over a network.”); Neil King Jr. and Ted Bridis, FBI's Wiretaps To Scan E-Mail Spark Concern, WALL ST. J., July 11, 2000, at A3 (describing Carnivore as “[e]ssentially a personal computer stuffed with specialized software, Carnivore represents a new twist in the federal government's fight to sustain its snooping powers in the Internet Age. [Carnivore] can scan millions of e-mails in a second. . .”); Ted Bridis and Neil King Jr., Carnivore E-Mail Tool Won't Eat Up Privacy, Says FBI, WALL ST. J., July 20, 2000, at A28 (“The system belongs to a class of tools 119 FILE:C:\WP51\72-1\MACLIN.DTP 120 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 [Carnivore] enables the FBI to conduct a one-way tap into an Ethernet stream—the flow of electronic impulses carrying communications through an internet connection. This method allows investigators to search out keywords, e-mail addresses or internet protocol (“IP”) addresses—a series of numbers and letters that correlate to websites. Carnivore can conduct at least two types of searches. First, installed on an ISP's [internet service provider] network, Carnivore can monitor and record the full content of messages that a targeted user has sent in real-time. This real-time, full-content search is conducted under the same basic legal structure that is employed for telephone wiretaps. Second, Carnivore is reportedly able to acquire the address information for the origin and the destination of all communications to and from a particular ISP customer. This function provides the TO and known as `packet filters' or `sniffers,' which look for parcels of data that travel across a network and compromise an e-mail or a visit to a Web site. Using a Windows screen, Carnivore also can be set to capture file downloads and chatroom conversations. It can grab e-mail from the most popular Web-based companies, including Yahoo! Inc. and Microsoft Corp.'s Hotmail. And once it is installed at an Internet service provider, the FBI can dial into Carnivore to make changes and monitor data that have been collected.”). The IITRI's REPORT on Carnivore, which was intended to address the complaints of civil libertarians and computer privacy advocates, was criticized by another group of experts. See Haas, supra note at 276 (explaining that “a five member team of renowned researchers and academicians” selected by the chief scientist at the Justice Department “harshly criticized the IITRI's review for what they considered `continued' and `serious concerns relating to Carnivore's system.'”) (footnotes omitted). The following law review articles have assisted me in understanding how Carnivore works, and have helped to identify the federal statutes that control various applications of Carnivore to electronic communications. Anthony E. Orr, Note, Marking Carnivore's Territory: Rethinking Pen Registers on the Internet, 8 MICH. T ELECOMM. & T ECH. L. REV. 219 (2002); Peter J. Georgiton, Note, The FBI's Carnivore: How Federal Agents May Be Viewing Your Personal E-Mail and Why There Is Nothing You Can Do About It, 62 OHIO STATE L. J. 1831 (2001); Trenton C. Haas, Carnivore and the Fourth Amendment, 34 CONN. L. REV. 261 (2001); Manton M. Grier, Jr., The Software Formerly Known As “Carnivore”: When Does E-Mail Surveillance Encroach Upon a Reasonable Expectation of Privacy?, 52 S.C. L. REV. 875 (2001); Frank J. Eichenlaub, Carnivore: Taking a Bite Out of the Fourth Amendment, 80 N.C. L. REV. 315 (2001); Maricela Segura, Note, Is Carnivore Devouring Your Privacy?, 75 S. CAL. L. REV. 231 (2001); Thomas R. McCarthy, Don't Fear Carnivore: It Won't Devour Individual Privacy, 66 MO. L. REV. 827 (2001); Peter J. Young, The Case Against Carnivore: Preventing Law Enforcement from Devouring Privacy, 35 IND. L. REV. 303 (2001); Sandy D. Hellums, Bits and Bytes: The Carnivore Initiative and the Search and Seizure of Electronic Mail, 10 WM . & MARY BILL RTS. J. 827 (2001); Matthew Mickle Werdegar, Lost? The Government Knows Where You Are: Cellular Telephone Call Location Technology and the Expectation of Privacy, 10 STAN. L. & P OL'Y REV. 103 (1998); Raphael Winick, Searches and Seizures of Computers and Computer Data, 8 HARV. J. L. & T ECH. 75 (1994) (pre-Carnivore article discussing the constitutional and statutory issues surrounding stored and transmitted computer data). For a comprehensive and insightful article on the interplay between Fourth Amendment protection and various statutes designed to protect informational privacy, see Daniel J. Solove, Digital Dossiers and the Dissipation of Fourth Amendment Privacy, 75 S. CAL. L. REV. 1803 (2002). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 121 FROM addresses on an e-mail and is viewed as the electronic equivalent of a telephone pen-register or trap and trace search.326 This final section will examine what impact Kyllo's holding will have for the second type of intercept Carnivore performs—its “pen mode”327 application. Specifically, has a search under the Fourth Amendment occurred when the FBI employs Carnivore to intercept and record the routing and addressing information of e-mails sent from home computers? A. Is E-mail Addressing Information Comparable To Telephone Numbers? Justice Department officials have told members of Congress th at Smith v. Maryland authorizes federal agents to use Carnivore's pen mode application without triggering Fourth Amendment protections. 328 A c c o r d i n g t o t h i s 326 Segura, supra note 325, at 234 (footnotes omitted). A “trap and trace” search occurs when an electronic device is installed to “capture[ ] the incoming electronic or other impulses which identify the originating number” of an instrument or device from which a wire or electronic communication was transmitted. 18 U.S.C. § 3127(4) (1994). As another commentator has noted, the FBI “describes Carnivore as something of a magic wand, which, when `waved' over large volumes of e-mail, can be used to identify and separate targeted emails from non-targeted messages without violating the rights of those who use e-mail for lawful purposes.” Eichenlaub, supra note 325, at 317. 327 Under the “pen mode” or pen register mode, Carnivore “can collect header information such as the `TO:' and `FROM:' addresses from e-mails and the IP addresses of computers in FTP [File Transfer Protocol] or HTTP [Hypertext Transfer Protocol] transactions.” Orr, supra note 325, at 223 (footnote omitted); see also, Georgiton, supra note 325, at 1842 (noting that “Carnivore can be set to retrieve only information concerning where an outgoing e-mail was sent, where an incoming e-mail was sent from, and the e-mail address itself”) (footnote omitted); IIITRI REPORT, supra note 325 at ix (“In pen mode, the operator can see the TO and FROM e-mail addresses and the IP addresses of computers involved in File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP) sessions.”). 328 See House Hearing, supra note 323 (statement of Kevin DiGregory, Deputy Associate Attorney General Department of Justice) (responding to a question from Representative Jerrold Nadler that this information could be obtained without probable cause, DiGregory stated: “That's correct, and I want to point out to you that the Supreme Court held in Maryland v. Smith, I believe in 1979, that there was no reasonable expectation of privacy in numbers dialed by a telephone because essentially, when someone turns over information to a third part like the telephone company, they should not have either a subjective or an objective reasonable expectation of privacy in that information”). In responding to a question from Senator Leahy, which essentially asked if the use of Carnivore crossed the lines established in Smith v. Maryland, Donald Kerr responded: [W]e believe that such URL information is essentially identical to a 121 FILE:C:\WP51\72-1\MACLIN.DTP 122 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 interpretation, federal agents “use Carnivore to conduct pen register searches because they believe that the addresses found in the TO and FROM lines of an e-mail are the electronic equivalent of the numbers dialed on a telephone.”329 Under Smith's reasoning, a telephone pen register is not a search because a pen register “do[es] not acquire the contents of communications”330 and because a telephone user has no reasonable expectation of privacy in the numbers dialed. By using his telephone and voluntarily conveying numerical information to the telephone company, a homeowner “assume[s] the risk that the company would reveal to police the numbers he dialed.”331 The Justice Department's view that Smith authorizes application of Carnivore's pen mode without implicating Fourth Amendment safeguards has not been fully tested in the federal courts. 332 As one commentator has noted, “[n]o court has taken the inferential step and applied the Smith rule regarding the apprehension of telephone numbers to the apprehension of e-mail addresses through electronic surveillance.”333 But this same writer also acknowledged that telephone number within a telephone networks that a criminal may dial. Thus, it is worth noting that a Carnivore-based pen register would provide the FBI with virtually the same information as a telephone pen register would, i.e., the telephone number dialed by the criminal subject reflecting that a communication to XYZ Corp. had occurred. No “content” information (substance, purport or meaning) is gleaned from either type of pen register as to the nature of the call. Senate Hearing, supra note 323 (statement of Donald M. Kerr, Assistant Director, Federal Bureau of Investigation). 329 Segura, supra note 325 at 262 (footnote omitted); see also Georgiton supra note 325 at 1842 (“The FBI contends that, consistent with Smith, they can retrieve [information concerning where an outgoing e-mail was sent, where an incoming e-mail was sent from, and the e-mail address itself] without need for a warrant.”) (footnote omitted). 330 Smith v. Maryland, 442 U.S. 735, 741 (1979). 331 Smith, 442 U.S. at 744. 332 See generally Haas, supra note 325, at 281-84 (summarizing federal appellate court rulings finding that persons were not entitled to Fourth Amendment protection when using internet systems privately maintained by their employer or where the government seized messages found on a chat room that was open to the public, and explaining that these rulings “are considerably different from a situation involving the use of Carnivore by the FBI to intercept Internet e-mail messages from one individual to another”). United States v. Maxwell, 45 M.J. 406 (C.A.A.F. 1996), which one commentator described as “[t]he leading case addressing the issue of privacy in personal e-mail accounts,” see Georgiton, supra note 325, at 1839, did not consider the status of e-mail addressing information. 333 Georgiton, supra note 325, at 1843. But cf., Haas, supra note 325, at 289 (describing an unreported and sealed ruling of a United States Magistrate which “concluded that the FBI's proposed activities to intercept e-mail information was the function equivalent of capturing telephone numbers with a pen register or trap and trace device”) (footnote omitted). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 123 federal judges have not been eager to include e-mail addressing information under the Fourth Amendment's protective scope. Federal judges “while not explicitly considering whether a person has a reasonable expectation of privacy in the addressing information for their e-mail, have been largely reluctant to consider anything beyond the content of electronic communications in their K a t z (reasonable expectation of privacy) analysis.”334 Although the lower federal courts have not yet endorsed the Justice Department's position that application of Carnivore's pen mode to e-mail messages sent by or to home computers is authorized by Smith, academic commentators have reached divergent conclusions on the constitutionality of Carnivore's pen mode intercept. As an initial matter, several writers have acknowledged the uncertainty of Smith as applied to e-mail addressing information. For example, one student commentator acknowledges that the “language of Smith v. Maryland makes it difficult to conclude definitively whether Internet users hold any reasonable expectation of privacy in e-mail addressing information.”335 Nevertheless, 334 Georgiton, supra note 325, at 1843 (footnote omitted). Although reported rulings on the constitutional status of e-mail addressing information have been rare, federal courts have often rejected claims that e-mail users' subscriber information is entitled to Fourth Amendment protection. Subscriber information typically includes an internet user's name; billing address; home, work, and fax numbers; and other billing information that is given to an internet service provider. Several federal courts, relying on Smith, have ruled that this information is not entitled to Fourth Amendment protection because individuals have no legitimate privacy interest in the account/subscriber information given to the ISP to establish an e-mail account. See, e.g., Guest v. Leis, 255 F. 3d 325, 336-37 (6th Cir. 2001); United States v. Hambrick, No. 99-4793, 2000 WL 1062039, at *11-12 (4th Cir. Aug. 3, 2000); United States v. Cox, 190 F. Supp. 2d 330, 333 (N.D. N.Y. 2002); United States v. Kennedy, 81 F. Supp. 2d 1103, 1110 (D. Kan. 2000). 335 Orr, supra note 325, at 226; see also Haas, supra note 325, at 290 (“At the outset, this Comment sought to establish whether Carnivore violated the Constitution's Fourth Amendment. Yet, after analyzing the issue, a yes or no answer is simply not possible. The issue is far more complex.”); Segura, supra note 325, at 258 (noting that “there remains a constitutional question as to whether there is an expectation of privacy in e-mail, or whether it is a transactional record in the hands of a third party”); Georgiton, supra note 325, at 1842 (noting that Smith's holding “suggests that the FBI does not need a warrant in order to get the addressing information from someone's e-mail account”) (emphasis added). See also ROSEN, supra note 178 at 70-78. Professor Rosen notes: Personal e-mail poses something of a constitutional puzzle: on the one hand, it sometimes originates from work, which is not a place that the Fourth Amendment reserves for special constitutional protection; on the other hand, it seems analytically similar to a private letter, which is one 123 FILE:C:\WP51\72-1\MACLIN.DTP 124 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 this writer concludes that e-mail users do not have a constitutionally protected interest in e-mail addressing information. E-mail users have no subjective expectation of privacy because “they certainly know that addressing information is being `conveyed' to their ISP, if for no other reason than to route their messages to the proper destination.”336 Moreover, because e-mail messages are typically stored on an ISP's computer equipment both before and after the recipient receives the message, users “know ISP's possess `facilities for recording' e-mail addressing information.”337 This writer also contends that no objective expectation of privacy exists in e-mail addressing information because the assumption of risk rule of Smith covers such information. Just as a person assumes the risk that the phone company will reveal to the police the numbers he dialed from his home telephone, a computer user assumes a similar risk by voluntarily conveying e-mail addressing information to an internet service provider. “A Carnivore installation on the ISP network simply facilitates this `revelation' by the ISP.”338 Other academic commentators have sought to distinguish Smith by arguing that disclosure of e-mail addressing information reveals more information than a telephone pen register. Smith emphasized the “limited capabilities” of a pen register, 339 which, unlike a wiretap, had no capacity to disclose the content of a caller's communications. Carnivore's pen mode, by contrast, can reveal more information than a traditional pen register. Carnivore can be set to gather lists of the individuals a computer user has sent e-mail to and received e-mail from, lists of the computers the user has transferred files with, and lists of computers/web-servers accessed by the user in the of the `papers' at the historical core of the Fourth Amendment. Id. at 70. 336 Orr, supra note 325, at 227. 337 Orr, supra note 325, at 227, quoting Smith v. Maryland, 442 U.S. 735, 743 (1979). 338 Orr, supra note 325, at 229. Another commentator has analogized e-mail addressing information to a traditional mail cover, which is not a search under the Fourth Amendment. Megan Connor Berton, Home Is Where Your Modem Is: An Appropriate Application of Search and Seizure Law to Electronic Mail, 34 AM . CRIM . L. REV. 163, 191-92 (1996) (“Just as senders of first class mail have little expectation of privacy in the information written or displayed on the outside of an envelope, e-mail users have little expectation of privacy in the address portion of their communications. This information is needed to deliver the message and, though often done solely by computer and without exposure to a human eye other than the recipient's, it is understood that any problems with the address causing difficulty in delivery may be noted by the system operator.”). 339 Smith, 442 U.S. at 742. FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 125 course of surfing the Internet. These types of addressing information reveal much more than a telephone number does.340 Similarly, some legal commentators have also rejected the argument that e-mail addressing information is not entitled to constitutional protection because e-mail users knowingly convey that information to a third party. They argue that Smith's assumption of risk rule should not apply to electronic communications because ISP employees sign employment agreements promising not to read or disclose private e-mail, and federal law does not authorize such disclosure.341 Under this view, e-mail users “should have an [objective] expectation of privacy in their electronic communication, even if saved on a remote server.”342 Given the logic of Smith, the Court is unlikely to recognize a constitutional difference between e-mail addressing information and the information that a telephone pen register reveals. Like a traditional pen register, 340 Georgiton, supra note 325, at 1845-46; see also Segura, supra note 325, at 252 (arguing that the rationale supporting Smith is inapplicable in the electronic context “because e-mail addresses often do reveal the individuals involved in the communication, whether the address is a derivation of the individual's name, or the full name in parenthesis after the address”); Segura, supra note 325, at 262 (noting that “e-mail addresses often reveal the parties who are writing one other, and there is usually no question about whether the message was completed, as it is instantaneously sent to an internet mailbox”) (footnote omitted); Chris J. Katopis, “Searching” Cyberspace: The Fourth Amendment and Electronic Mail, 14 T EMP. ENVTL. L & T ECH. J. 175, 199 (1995) (arguing that “where a pen register and trap and trace device only reveal a telephone number, clearly much more information is obtained by analyzing the header of e-mail. The header is a portion of the transmission that does contain content”); cf., Orr, supra note 325, at 231 (conceding that “it appears e-mail addressing information often does reveal more about the identity of the sender and receiver than the ten simple digits of a telephone number,” but concluding “it is unclear whether e-mail addresses really reveal that much more about the identity of message senders and recipients”) (emphasis added); Skok, supra note 25, at 7579 (arguing that, although Web users reveal clickstream data to third parties, Smith's assumption of risk theory should not apply to clickstream data because the clickstream reveals “a record of a person's cyberspace activity, [which] allows officers to entirely recreate an online experience”). 341 See Segura, supra note 325, at 253; cf., 1 L AF AVE, supra note 21, § 2.6 at 120 (noting arguments that “`computer operators have no legitimate purpose in reading records unrelated to the operator's function, just as the telephone company has no legitimate purpose in listening to the contents of conversations,' and thus the user does have a legitimate expectation of privacy as to `the contents of electronic mail messages or personal files.' This is so even when the system manager makes backup copies of such records, and even when the users are all employees of the system operator.”) (footnotes omitted). 342 Segura, supra note 325, at 253. 125 FILE:C:\WP51\72-1\MACLIN.DTP 126 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 Carnivore's pen mode does not disclose the content of e-mail messages. 343 To be sure, Carnivore's pen mode “does reveal more about the identity of the sender and receiver than the ten simple digits of a telephone number.”344 But the revelation of this additional information is probably not enough to persuade the Court that Smith's reasoning should be 343 Carnivore's pen mode collects “not only the `To:' and `From:' fields of targeted e-mail messages, but also the length of the message and the length of individual fields within those message. In fact, the system captures the entire email message and all of its fields (including the `SUBJECT' line contents of the message), but replaces each character in fields other than `To:' and `From:' with an X.” Orr, supra note 325, at 230. Many writers have asserted that Carnivore's pen mode reveals more information than a pen register, which thereby distinguishes the analysis of Smith. See, e.g., Segura, supra note 325, at 262 (“As a basic matter, e-mail addresses often reveal the parties who are writing one other, and there is usually no question about whether the message was completed, as it is instantaneously sent to an internet mailbox”) (footnote omitted); Georgiton, supra note 325, at 1845-46 (same); Haas, supra note 325, at 288 (same). For example, Carnivore can reveal the length of an e-mail message, which discloses more information than a pen register reveals. See, e.g., Orr, supra note 325, at 230; Eichenlaub, supra note 325, at 330, n.105. This fact probably will not matter to the Court. Disclosure of the length of an e-mail message without revealing the contents of that message can be analogized to FBI agents learning the length of a telephone conversation without learning about the contents of the oral communications. If the pen register in Smith had disclosed the length of the calls along with the numbers dialed, I doubt that this additional information would have changed the result in that case. See Smith, 442 U.S. at 742 (noting that subscribers realize “the phone company has facilities for making permanent records of the numbers they dial, for they see a list of their long-distance (toll) calls on their monthly bills”). Most telephone bills also provide the length of long distance calls. Therefore, the fact that Carnivore's pen mode reveals the length of an e-mail message without disclosing its contents is unlikely to affect the Court's determination of whether a search has occurred. One commentator who argues that e-mail addressing information is not entitled to constitutional protection, nevertheless disagrees with my assessment that Carnivore's capability to record the length of an e-mail message will not affect the Court's judgment on the constitutional status of e-mail addressing information. See Orr, supra note 325, at 231-32. This commentator asserts that the problem of overcollection “may be a fatal constitutional flaw” because, unlike telephone numbers and e-mail addressing information, “the length of messages and the length of individual fields within those messages is not regularly collected for any legitimate business purpose.” Moreover, Carnivore's “collection of the entire body of the message in “X” form” creates the potential for abuse because “if the software can electronically `redact' a message, perhaps it could also un-redact it, revealing the full contents.” Accordingly, this writer concludes that Carnivore, as presently programmed, “should not be authorized for use as an Internet pen register.” Orr, supra note 325, at 231-32. While I agree that Carnivore's ability to capture the entire body of an e-mail message creates the potential for abuse, that fact will not make a difference to the Court. Long ago, the Court made clear technological devices that present a risk for invasions of privacy do not, standing alone, trigger Fourth Amendment protection. United States v. Karo, 468 U.S. 705, 712 (1984) (explaining that the installation of an unmonitored beeper “created a potential for an invasion of privacy, but we have never held that potential, as opposed to actual, invasions of privacy constitute searches for purposes of the Fourth Amendment . . . . It is the exploitation of technological advances that implicates the Fourth Amendment, not their mere existence.”). 344 Orr, supra note 325, at 231. FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 127 abandoned when deciding whether Carnivore's pen mode intercept constitutes a search. Similar arguments were raised in Smith to no avail. For example, Justice Stewart's dissent noted that telephone numbers dialed from a private line “are not without `content.'”345 A pen register discloses to government officials “the identities of the persons and the places called, and thus reveal the most intimate details of a person's life.”346 In like manner, Justice Marshall's dissent contended that giving police officials unfettered discretion to employ pen registers jeopardized privacy, as well as First Amendment, interests. The prospect of unregulated governmental monitoring will undoubtedly prove disturbing even to those with nothing illicit to hide. Many individuals, including members of unpopular political organizations or journalists with confidential sources, may legitimately wi sh to avoid disclosure of personal contacts. Permitting governmental access to telephone records on less than probable cause may thus impede certain forms of political affiliation and journalistic endeavor that are the hallmark of a truly free society.347 These arguments did not convince the Smith majority that a pen register invades a homeowner's privacy when he uses a telephone,348 and there is no reason to think that similar arguments will persuade the Court to discard Smith's reasoning when determin ing Carnivore's pen mode intercept constitutes a search. Likewise, the Court is unlikely to abandon the assumption of risk rule when it confronts the constitutional status of e-mail addressing information. Smith concluded that when a homeowner voluntarily conveyed numerical information to a third party, he “assumed the risk” that the third party would reveal that information to the government. As one commentator has recognized, Smith's logic is equally Smith, 442 U.S. at 748 (Stewart, J., dissenting). Id. 347 Id. at 751 (Marshall, J., dissenting) (citations omitted); see also, David E. Steinberg, Making Sense of Sense-Enhanced Searches, 74 MINN. L. REV. 563, 577 (1990) (“The pen register, however, cannot be limited to provide information only about phone numbers that may relate to criminal activity. Police will learn of all calls dialed by the suspect, and thus will discover if the suspect has talked to the girl next door, the local Alcoholics Anonymous hotline, or the national Communist Party headquarters.”). 348 See Werdegar, supra note 256, at 108 (1998) 345 346 127 FILE:C:\WP51\72-1\MACLIN.DTP 128 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 applicable to e-mail addressing information. 349 It will not matter that ISP employees “must sign a confidentiality agreement that they will not read [or disclose] customer communications such as e-mail.”350 Telephone operators presumably operated under similar restraints when Smith was decided, and even if such restraints did not exist, the employment policies and practices of telephone companies were irrelevant to the result in Smith.351 What was relevant in Smith, and will be relevant in a future case involving e-mail addressing information, is the homeowner's voluntary decision to convey information to a third party. Under the assumption of risk theory, the disclosure of information to a third party denies Fourth Amendment protection to what might otherwise be private information.352 In sum, if the analysis of Smith determines the constitutional status of e-mail addressing information, then Carnivore's pen mode intercept will not be considered a search under the Fourth Amendment. The two main features that compelled the Court to find that a pen register was not a search—the non-disclosure of the contents of communications and the fact that the individual assumed the risk that private 349 Orr, supra note 325, at 229 (“Substituting the proper e-mail terms into [Smith's] formula, it becomes clear that e-mail addressing information revealed to no one other than an ISP's equipment nevertheless falls squarely within the Miller assumption of risk doctrine, as interpreted in Smith.”); Ku, supra note 1, at 1356 (“If Carnivore is programmed, for example, to capture the addresses of people with whom an individual is corresponding via e-mail, the analogy to Smith and the capturing of telephone numbers is even closer.”). 350 Segura, supra note 325, at 253. 351 In Smith, the defendant argued that he had an expectation of privacy in the local calls he dialed because telephone companies typically do not record local calls. The Court concluded that argument lacked any merit: The fortuity of whether or not the phone company in fact elects to make a quasi-permanent record of a particular number dialed does not, in our view, make any constitutional difference. Regardless of the phone company's election, petitioner voluntarily conveyed to it information that it had facilities for recording and that it was free to record. In these circumstances, petitioner assumed the risk that the information would be divulged to police. Under petitioner's theory, Fourth Amendment protection would exist, or not, depending on how the telephone company chose to define local-dialing zones, and depending on how it chose to bill its customers for local calls . . . . We are not inclined to make a crazy quilt of the Fourth Amendment, especially in circumstances where (as here) the pattern of protection would be dictated by billing practices of a private corporation. Smith, 442 U.S. at 745. 352 See Orr, supra note 325, at 229 (“When an Internet user sends a message over an ISP's network, she has revealed the addressing information to the ISP's equipment in the ordinary course of business, and she assumes the risk that the ISP will reveal her addressing information to the government. A Carnivore installation on the ISP network simply facilitates this `revelation' by the ISP.”) (footnote omitted). FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 129 information would be revealed to the government—apply equally to e-mail addressing information. Thus, if Smith's holding is the Court's “last word” on this issue, the Justice Department correctly concludes that the FBI is free to use Carnivore's pen mode intercept without triggering Fourth Amendment scrutiny. B. Does Kyllo's Holding Cover E-Mail Addressing Information? Smith's holding, however, is not the end of the line. The rule established in Kyllo is pertinent to the constitutional status of e-mail addressing information. Kyllo holds that a search occurs when government actors acquire by “senseenhancing technology any information regarding the interior of the home that could not otherwise have been obtained without physical `intrusion into a constitutionally protected area.'”353 If this standard is applied to Carnivore's pen mode, then intercepting e-mail addressing constitutes a search. Carnivore's pen mode enables the FBI to obtain by technology information regarding the interior of the home that could not otherwise be obtained without physical intrusion into a home. A pen mode intercept allows FBI agents to monitor information regarding the recipients and senders of e-mail messages sent from or to a homeowner's computer. This information would be unavailable to the government unless FBI agents were inside th e home and had access to a computer user's e-mail account. Moreover, it is obvious that Carnivore is not a device generally available to the public and that Carnivore's pen mode provides greater detail about the inside of a home than a thermal imager, which only reveals the relative amount of heat escaping from a house. Finally, Carnivore cannot escape constitutional scrutiny because e-mail addressing information is available from a third party. Under Kyllo's analysis, Carnivore does not become a non-search merely because the information acquired by a pen mode intercept is obtainable from an internet service provider.354 In sum, a straightforward application of Kyllo's holding Kyllo v. United States, 533 U.S. 27, 34 (2001). Kyllo, 533 U.S. at 35, n.2 (“The fact that equivalent information could sometimes be obtained by other means does not make lawful the use of means that violate the Fourth Amendment.”). 353 354 129 FILE:C:\WP51\72-1\MACLIN.DTP 130 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 demonstrates that a search occurs when the FBI employs Carnivore to intercept and record the routing and addressing information of e-mails sent from or to home computers. If the Court is forced to address the constitutional status of e-mail addressing information, at least two options will be available. The Court can overrule Smith v. Maryland or confine Kyllo's holding to thermal imaging. The likelihood that Smith will be overruled seems remote, although Kyllo substantially undermines Smith's legal foundation. As noted above, the analytical framework that dictates the conclusion that thermal imaging is a search also compels the judgment that a pen register is a search. On the other hand, limiting Kyllo to the narrow context of thermal imaging and not applying its holding to Carnivore is both unprincipled and perverse. A principled application of Kyllo would extend to its holding to all places and contexts entitled to Fourth Amendment protection. 355 Furthermore, Fourth Amendment law would be bizarre if Kyllo did not apply to Carnivore's pen mode. After all, the Kyllo majority was concerned about interpretations of the Fourth Amendment that would “leave the homeowner at the mercy of advancing technology.”356 Even commentators who believe that Carnivore can be re-programmed to comply with Fourth Amendment safeguards, concede that Carniv ore, as currently programmed, reveals more private information than previously permitted under the Court's precedents. 357 I t would be strange indeed for the Court to reject a “mechanical interpretation of the Fourth Amendment” when considering the constitutional status of a crude device that involves “no `significant' compromise of [a] homeowner's privacy,”358 but then put aside its concerns about “advancing technology” and the privacy of the home when determining whether Carnivore's pen mode constitutes a search.359 What will the Court do? I predict that the Court will 355 See id. at 48-49 (Stevens, J., dissenting). Id. at 35-36. See, e.g., Orr, supra note 325, at 231. 358 Kyllo, 533 U.S at 35 & 40. 359 The invasiveness of Carnivore's reach has been described elsewhere. See, e.g., Bridis & King, supra note 325, at A3 (quoting a former prosecutor saying that Carnivore is “the electronic equivalent of listening to everybody's phone calls to see if it's the call you should be monitoring. You develop a tremendous amount of information.”); Haas, supra note 325, at 271 (attributing to Richard Forno the argument that “Carnivore is an electronic eavesdropping device”); Segura, supra note 325, at 231-32 (noting Carnivore “can conduct a far-reaching, general search of people who are not subject to a court order,” and that many worry that “the Carnivore system will facilitate a `fishing expedition' in search of any evidence of crime”). 356 357 FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 131 conclude that Carnivore's pen mode does not violate the Fourth Amendment. The Court can achieve this result by using one of two modes of analysis. Under the first approach, as suggested, the Court will confine Kyllo to the context of thermal imaging and apply the analytical framework of Smith to conclude e-mail addressing information is not protected under the Fourth Amendment. If the Court adopts this model, Kyllo, like Katz, will become a “paper tiger” and will have little impact on the government's authority to use technology to gather information or monitor individuals' online activity.360 Under the second approach, the Court can avoid the tension between Kyllo and Smith by relying on its “special needs” cases to find that Carnivore's pen mode does not violate the Fourth Amendment. “Special needs” analysis is a fancy way to describe the balancing test performed by the Court in cases where the government lacks judicial authority or probable cause to conduct searches and seizures. 361 Indeed, 360 See Skok, supra note 25, at 78-79, which argues that if Smith's analysis is applied to clickstream data, then law enforcement officers will be able to know: not only what sites [an individual] visited, but also for how long each was visited, how often each site was re-visited, and which links were followed from each site. A comparable level of knowledge in the concrete world would require that the officers know not only which books the suspect borrowed, but also when she read the books, how long she spent reading each book and each page, and the sequence in which she read each book and each page. Skok, supra note 25, at 78-79. 361 At its inception, the “special needs” rule was intended as a narrow exception to the warrant and probable cause requirements. “Only in those exceptional circumstances in which special needs, beyond the normal need for law enforcement, make the warrant and probable-cause requirement impracticable, is a court entitled to substitute its balancing of interests for that of the Framers.” New Jersey v. T.L.O. 469 U.S. 325, 351 (1985) (Blackmun, J., concurring). Although intended as a limited exception, the special needs cases have expanded to the point where government actors are now permitted to conduct suspicionless searches in various contexts (including scenarios that involve criminal law enforcement) without establishing a compelling government interest. See J OSHUA DRESSLER, UNDERSTANDING CRIMINAL P ROCEDURE 338-353 (3d ed. 2002). Professor Dressler explains that “when the Court determines that `special needs' exist, it evaluates the government activity—the special need—by [a] `reasonableness' balancing standard.” Id. at 339. Not surprisingly, “nearly always, the government interest `trumps' the requirements of a warrant and/or probable cause (or reasonable suspicion).” Id. (footnote omitted). On the Constitution's 200th anniversary, Professor Kamisar explained why the “special” needs doctrine undermines core Fourth Amendment values: The handiness of the administrative search concept has gladdened the hearts of many government lawyers. But it has alarmed other observers, including me. Today, potential administrative searches are 131 FILE:C:\WP51\72-1\MACLIN.DTP 132 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 “special needs” analysis may be an enticing framework to determine the constitutional status of e-mail addressing information because the Court has already used this doctrine to assess the constitutionality of drug testing programs in various contexts. Urinalysis, of course, is another type of technology that reveals information to the government that would otherwise be unavailable without the use of intrusive means by government officers. Since 1989, the Court has decided six cases challenging the constitutionality of drug testing policies. 362 In only two cases, has the Court invalidated the urinalysis programs on Fourth Amendment grounds. 363 The three main factors considered by the Court in determining the validity of a drug testing regime are the nature of the privacy interest, the character of the intrusion, and the nature and immediacy of the governmental interests. 364 Applying this framework, the Court could decide that Carnivore's pen mode intercept constitutes a search, but the intrusion is conducted in a minimal manner and the government's need for e-mail addressing information “is important—indeed, perhaps buzzing around the Fourth Amendment like a swarm of bees. With drug and AIDS testing, the drone may soon grow deafening . . . . However great the threat posed by illicit drug use and the AIDS virus, the `individualized suspicion' concept must remain the heart of the Fourth Amendment. I believe we should greet claims of `national interest,' `emergency' or `necessity' with considerable skepticism. Slogans like these can be—and have been—a free people's most effective tranquilizers. As we mark the Constitution's 200th anniversary, we would do well to remember that. Yale Kamisar, Drugs, AIDS and the Threat to Privacy, N.Y. T IMES, Sept. 13, 1987, § 6 (Magazine), at 109. For more recent academic commentary on the “special needs” cases, see DRESSLER, supra note 361, at 338, n.1 (citing articles). 362 See Bd. of Ed. v. Earls, 122 S. Ct. 2559 (2002) (approving drug testing of all students who participate in competitive extracurricular activities); Ferguson v. Charleston, 532 U.S 67 (2001) (invalidating drug testing of maternity patients); Chandler v. Miller, 520 U.S. 305 (1997) (invalidating urinalysis requirement for candidates running for state office); Vernonia Sch. Dist. 47J v. Acton, 515 U.S. 646 (1995) (upholding random drug testing of public school students who voluntarily participate athletic teams); Treasury Employees v. Von Raab, 489 U.S. 656 (1989) (upholding drug testing customs officers applying for positions involving drug interdiction or requiring the carrying of a firearm or the handling of classified documents); Skinner v. Ry. Labor Executives' Assn., 489 U.S. 602 (1989) (upholding drug and alcohol testing of railroad employees following major train accidents). 363 See Ferguson, 532 U.S. at 81 (ruling unconstitutional drug testing program of maternity patients suspected of drug use primarily because the main objective of the testing was to gather evidence for law enforcement purposes); Chandler, 520 U.S. at 318 (invalidating statute requiring drug testing of candidates running for state office because the state had not demonstrated a substantial problem of drug abuse to justify a special need for suspicionless searches). 364 Earls, 122 S. Ct. at 2565-67; Acton, 515 U.S. at 654-664. FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 133 compelling,”365 especially if the facts involve a terrorist or national security threat. 366 Based on volume alone, the drug testing cases provide considerable insight on the Justices' views about the interaction between technology and the Fourth Amendment. Therefore, lawyers and scholars may be better able to predict 365 Acton, 515 U.S. at 661. The drug testing cases illustrate how the Court often finds that a challenged intrusion constitutes a search, but is nevertheless constitutionally permissible because the privacy interests and character of the intrusion are minimal. See, e.g., Earls, 122 S. Ct. at 2567 (explaining that “[g]iven the minimally intrusive nature of the sample collection and the limited uses to which the test results are put, we conclude that the invasion of students' privacy is not significant”); Acton, 515 U.S. at 658 (noting that “the privacy interests compromised by the process of obtaining the urine sample are in our view negligible”); Skinner, 489 U.S. at 604 (concluding that drug and alcohol testing procedures “pose only limited threats to the justifiable expectations of privacy of covered employees”). 366 See, e.g., In re: Sealed Case No. 02-001, at 53-55, United States Foreign Intelligence Surveillance Court of Review (Decided Nov. 18, 2002), available at http://www.cadc.uscourts.gov/common/newsroom/02-001.pdf (relying on the Court's “special needs” cases as support for different Fourth Amendment requirements when the government's interest is to protect the nation against terrorist threats as to opposed to ordinary crime control). In theory, the “special needs” doctrine does not apply when the search promotes law enforcement interests. For example, in Ferguson, the Court distinguished a city hospital's drug testing of maternity patients from previously approved drug testing programs. “In each of those earlier cases, the `special need' that was advanced as a justification for the absence of a warrant or individualized suspicion was one divorced from the State's general interest in law enforcement.” Ferguson, 532 U.S. at 79. Although “the ultimate goal of the program [in Ferguson] may well have been to get the women in question into substance abuse treatment and off of drugs, the immediate objective of the searches was to generate evidence for law enforcement purposes in order to reach that goal.” Id. at 83-84 (footnotes omitted). While the Court asserts that its “special needs” doctrine is inapplicable to searches that promote law enforcement objectives, its precedents suggest that this is not always the case. See New York v. Burger, 482 U.S. 691, 712-13 (1987) (applying “special needs” analysis and upholding statute authorizing administrative officers and police officers to conduct suspicionless searches of owners of automobile junkyards); Burger, 482 U.S. at 716 (rejecting claim that an “administrative scheme is unconstitutional simply because, in the course of enforcing it, an inspecting officer may discover evidence of crimes, besides violations of the scheme itself”); Griffin v. Wisconsin, 483 U.S. 868 (1987) (applying “special needs” analysis and upholding warrantless search of a probationer's home by a probation officer); cf. Ferguson, 532 U.S. at 100 (Scalia, J., dissenting) (“[S]pecial-needs doctrine was developed, and is ordinarily employed, precisely to enable searches by law enforcement officials who, of course, ordinarily have a law enforcement objective”); RONALD J AY ALLEN ET AL., COMPREHENSIVE CRIMINAL P ROCEDURE 614 (2001) (explaining that New York v. Burger “most clearly illustrates the degree to which the Court is willing to recognize `special needs' in contexts where law enforcement interests are clearly also present”); DRESSLER, supra note 360 (acknowledging the “considerable tension between Ferguson and Griffin” on whether the presence of law enforcement interests eliminates the applicability of the “special needs” doctrine). 133 FILE:C:\WP51\72-1\MACLIN.DTP 134 Jan 01/24/5 Mon 10:47am MISSISSIPPI LAW JOURNAL [VOL. 72 the Court's thinking on the “proper analytical structure that should be employed to reconcile technological change with Fourth Amendment rights”367 by focusing on the Court's “special need” cases, rather than focusing on Kyllo. CONCLUSION The attacks of September 11 had an enormous impact on Americans' attitudes about law enforcement. After those attacks, President Bush and Congress enacted sweeping legislation designed to protect the nation from future terrorism. Much of that legislation expands the search and seizure powers of government. No one should be lulled into thinking that these expanded powers will be confined to highly-trained FBI agents investigating international terrorists. Once the judiciary approves additional search and seizure powers for federal agents, state and local police usually acquire similar authority in their fight against ordinary crime. 368 Thus, the reaction of the federal judiciary to the government's war on terrorism is likely to affect the freedom of all Americans. It may seem unimportant to the non-lawyer whether the courts consider a particular police practice a “search” or not. But this perception is dangerous to freedom. Yale Kamisar rightly observes: Freedom of speech, freedom of religion, and other freedoms, have earned much praise, and deservedly so, but the Fourth Amendment may plausibly be viewed as the centerpiece of a free democratic society. All the other freedoms presuppose that lawless police action have been restrained. What good is freedom of speech or freedom of religion or any other freedom if law enforcement officers have unfettered power to violate a person's privacy and liberty when he sits in his home or drives his car or walks the streets?369 Kyllo is a significant ruling on the scope of the Fourth Amendment. Although Kyllo's impact on future cases remains uncertain at this point, the choices available to the Court are 367 Brochure Announcing Symposium on April 12, 2002, The Effect of Technology on Fourth Amendment Analysis and Individual Rights, National Center for Justice and the Rule of Law, The University of Mississippi School of Law. 368 See William J. Stunz, Local Policing After the Terror, 111 YALE L. J. 2137, 2140 (2002) (noting that “most constitutional limits on policing are transsubstantive—they apply equally to suspected drug dealers and suspected terrorists”) (footnote omitted). 369 Yale Kamisar, The Fourth Amendment And Its Exclusionary Rule, T HE CHAMPION Aug, 1991, at 2. FILE:C:\WP51\72-1\MACLIN.DTP 2002] Jan 01/24/5 Mon 10:47am KATZ, KYLLO, AND TECHNOLOGY 135 not difficult to imagine. The Court could interpret Kyllo's holding as limited to a privilege against thermal imaging directed at a home. On the other hand, the Court may recognize that Kyllo's logic extends to other contexts like email addressing information. If the Court chooses the former interpretation, the constitutional freedoms of all Americans will be diminished. 135